740 Midterm Lessons 3-5,7-9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Specify the correct order of steps necessary to creating and mounting a VHD.

1. Log on with administrative privileges and open Server Manager. 2. Click Tools > Computer Management. 3. Click Disk Management and then click Create VHD from the Action menu. 4. Specify the Location path and name for the new VHD file and then specify the maximum size of the disk. 5. Select the virtual hard disk format option (VHD or VHDX). 6. Select one of the following VHD types (Fixed size or Dynamically expanding). 7. Click OK for the system to create and attach the VHD file. The VHD appears as a disk in the Disk Management snap-in.

Which of the following is the maximum size of an NTFS volume with 64-KB clusters?

256 TB

When using deduplication, what ratio would be expected for general files?

2:1

Pass-through disk

A disk that permits a VM access to the storage system of a host

Differencing disk

A virtual hard disk that stores only changes from parent virtual hard disk.

Shared Virtual Hard Disk

A virtual hard disk used by multiple VMs

What allows guest VMs to communicate directly with PCIe devices?

Discrete Device Assignment

What option do you choose from the Actions pane in Hyper-V Manager to convert a VHD?

Edit Disk

Which type of permission is granted directly to a file or folder? Explicit

Explicit

Explicit (NTFS permission)

Granted directly to a file folder

Inherited (NTFS permission)

Granted to a folder (parent object or container) that flows into child object (subfolders or files inside the parent folder)

In Hyper-V, what is used to provide encryption keys when using Hyper-V to encrypt a VM and its disks?

Host Guarding Service

Storage Quality of Service

New technology in Windows Server 2016 that enhances the IOPS of a virtual machine's access storage

What cmdlet creates a new storage QoS policy?

New-StorageQosPolicy

Which Hyper-V tool is used to view the resource usage of a host and individual VMs?

Resource Metering

What feature is used to ensure that each component loaded during the boot process is signed and validated?

Secure boot

What type of checkpoint is designed for testing and development environments?

Standard Checkpoint

Which volume types supported by Windows Server 2016 does not provide fault tolerance?

Striped & Spanned

Which type of backup would benefit from Windows deduplication? a. Block-based backups b. File-based backups c. Chunk store backups d. Reparse point backups

a. Block-based backups

Which of the following options are available when selecting the Import Virtual Machine Wizard? (Choose two answers.) a. Copy the virtual machine. b. Move the virtual machine's data by selecting where to move the items. c. Register the virtual machine in place. d. Move the virtual machine's data automatically.

a. Copy the virtual machine. c. Register the virtual machine in place.

Which of the following NTFS permissions is needed to change attributes and permissions? a. Full Control b. Modify c. Read and Execute d. Write

a. Full Control

Which PowerShell cmdlet should be used to view the iSCSI initiator connections? a. Get-IscsiConnection b. Get-IscsiSession c. Get-IscsiTarget d. Connect-IscsiTarget

a. Get-IscsiConnection

What deployment scenarios does storage QoS support? Choose two. a. Hyper-V using a Scale-Out File Server b. Hyper-V using Generation 2 VMs c. Hyper-V using virtual Fibre Channel d. Hyper-V using Clustered Shared Volumes

a. Hyper-V using a Scale-Out File Server d. Hyper-V using Clustered Shared Volumes

Which technologies can help make iSCSI highly available? (Choose two answers.) a. MCS b. EFS c. LUNX d. MPIO

a. MCS d. MPIO

Which of the following drives can be added to a storage pool? (Choose all that apply.) a. SATA b. eSATA c. USB d. SCSI

a. SATA b. eSATA c. USB d. SCSI

Which of the following statements are true of striped volumes? (Choose all that apply.) a. Striped volumes provide enhanced performance over simple volumes. b. Striped volumes provide greater fault tolerance than simple volumes. c. You can extend striped volumes after creation. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

a. Striped volumes provide enhanced performance over simple volumes. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost

Which of the following statements are true of striped volumes? (Choose all that apply.) a. Striped volumes provide enhanced performance over simple volumes. b. Striped volumes provide greater fault tolerance than simple volumes. c. You can extend striped volumes after creation. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

a. Striped volumes provide enhanced performance over simple volumes. d. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

When creating storage spaces, which of the following types of resiliency works best for protection against two drives failing simultaneously while setting up storage spaces? a. Three-way mirror b. Two-way mirror c. Parity d. Simple

a. Three-way mirror

Which of the following are requirements for extending a volume on a dynamic disk? (choose all that apply.) a. When extending a simple volume, you can use only the available space on the same disk, if the volume is to remain simple. b. The volume must have a file system before you can extend a simple or spanned volume. c. You can extend a simple or spanned volume if you formatted it using the FAT or FAT32 file systems. d. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

a. When extending a simple volume, you can use only the available space on the same disk, if the volume is to remain single. d. You can extend a simple volume across additional disks if it is not a system volume or a boot volume.

When using NFS, how do you connect to the shared folder? a. You mount the volume to a local folder. b. You mount the volume to a remote folder. c. You access the shared folder using a UNC. d. You access the shared folder using a URL.

a. You mount the volume to a local folder.

Which of the following can be installed so that Windows Server 2016 can be used to present iSCSI volumes to Windows servers? a. iSCSI target b. iSCSI source c. iSCSI receiver d. iSCSI initiator

a. iSCSI target

When creating a storage space, how many disks are needed when setting up parity for resiliency settings in a storage pool? a. 2 b. 3 c. 5 d. 4

b. 3

Which protocol is used for authentication for iSCSI? a. PAP b. CHAP c. MS-CHAPv2 d. SPAP

b. CHAP

Which technology is used to reduce disk space usage by eliminating blocks of data that are repeated among files? a. Compression b. Deduplication c. Encryption d. Search and Destroy

b. Deduplication

When defining access to NFS, which two items must be included? (Choose two answers.) a. Domain name b. GID c. Admin access d. UID

b. GID d. UID

In Hyper-V, which generation is needed to use Secure Boot or SCSI virtual hard disk? a. Generation 1 b. Generation 2 c. Generation 3 d. Generation 1 and 2

b. Generation 2

Which command can be used to view the status of a volume that is configured to use Windows deduplication? a. Get-DedupStatus b. Get-DedupVolume c. Get-DedupJob d. Get-DedupVolumeStatus

b. Get-DedupVolume

A subset of Windows Server 2016 as a dedicated product for virtualization and provided free by Microsoft is called . a. Hyper-V Manager b. Hyper-V Server c. Hyper-V Role d. hypervisor

b. Hyper-V Server

Which of the following can be used to encrypt iSCSI traffic? a. CHAP b. IPsec c. BitLocker d. EFS

b. IPsec

Which of the following is a unique identifier that is used to identify iSCSI initiators and targets? a. iSNS b. IQN c. MPIO d. MPC

b. IQN

Which of the following is the next step after creating a virtual hard disk (VHD)? a. Mounting it either through Server Manager or the Disk Management snap-in b. Initializing the disk and creating volumes on it, just as you would a physical disk c. Using the VHD (creation of the VHD file readies the disk for storage) d. Mounting the VHD file to a Hyper-V virtual machine

b. Initializing the disk and creating volumes on it, just as you would a physical disk.

If you want to install additional roles along with Hyper-V, which of the following solutions is recommended? a. Microsoft recommends that you install other roles on one of the VMs you create with Hyper-V. b. Microsoft recommends you install only roles related to Hyper-V. c. Microsoft recommends you install only roles on the parent partition. d. There are no recommendations for roles installed with Hyper-V.

b. Microsoft recommends you install only roles related to Hyper-V.

What cmdlet creates a new differencing disk? a. New-DiffDisk b. New-VHD c. New-Diff d. New-VHDDiff

b. New-VHD

Which of the following is not a tool that you can use to create a virtual hard disk? a. diskpart b. SAN Manager c. Disk Management d. PowerShell

b. SAN Manager

Which of the following can be used to extend the Active Directory schema to store UNIX attributes?

b. Server for NFS role

Which of the following processes reserves space for future use when working with storage spaces/storage pools? a. Partitions b. Thin provisioning c. SMB blocks d. Provisioned storage blocks

b. Thin provisioning

When creating a storage space, which of the following resiliency settings requires at least five drives? a. Parity b. Three-way mirror c. Two-way mirror d. Simple

b. Three-way mirror

Which of the following is not a share permission? a. Full Control b. Write c. Change d. Read

b. Write

As an administrator, you are configuring an iSCSI Target Server role and multiple volumes that will be assigned to multiple servers using iSCSI initiators. Because these servers contain confidential information, you want to make sure that they are not accessed by other servers using an iSCSI initiator. Which of the following statements best describes the recommended course of action? a. You should specify the initiator ID that can connect when creating the iSCSI virtual disk. b. You should specify the initiator ID that can connect when creating the iSCSI target. c. You should enable IPsec. d. You should configure the iSCSI ACL list when he configures the iSCSI initiator.

b. You should specify the initiator ID that can connect when creating the iSCSI target.

Regarding virtualizing servers, the Windows Server 2016 means each VM has its own . a. virtual machine (VM) b. hypervisor c. virtualization d. host operating system

b. hypervisor

Which protocol allows a server to connect to a SAN by sending SCSI commands over a TCP/IP network? a. Fibre Channel b. iSCSI c. SATA d. MPIO

b. iSCSI

A company uses nearly 30 servers, all running Windows Server 2016 and each using iSCSI storage. The small team of administrators is complaining that it is becoming difficult to locate the available iSCSI resources on the network. Which of the following can be used to help the administrators quickly locate iSCSI resources? a. DNS b. iSNS c. iSCSI Target Storage Provider d. Windows Standard-Based Storage Management feature

b. iSNS c. iSCSI Target Storage Provider

Which port is used by iSCSI? a. 1080 b. 8080 c. 3260 d. 4800

c. 3260

How much space does a VHDX support? a. 8 TB b. 2 TB c. 64 TB d. 1 TB

c. 64 TB

Which of the following share permissions on a FAT32 volume enable adding files and folders to a shared folder? (Choose all that apply.) a. Read b. Write c. Change d. Full Control

c. Change d. Full Control

You are the administrator for an organization that provides 70 sites in which users store their home and shared public folders. These sites use DFS to replicate files to four subsidiary servers. Which of the following can be used to significantly reduce the file size while maintaining performance? a. EFS b. NTFS encryption c. Data deduplication d. Disk Cleanup

c. Data deduplication

Which Windows PowerShell cmdlet can be used to grant access to a virtual machine? a. Grant-VMRights b. Grant-VMPermissions c. Grant-VMConnectAccess d. Grant-VMAccess

c. Grant-VMConnectAccess

When using the Create a Virtual Machine Wizard, how is the virtual hard disk created by default? a. You set the maximum size and it starts that size. b. It starts at 40 GB and warns the administrator when nearly full. c. It starts small and dynamically expands up to the maximum size you specify. d. Its starts small and continually expands to fill the available storage.

c. It starts small and dynamically expands up to the maximum size you specify.

Which of the following allows you to connect to a virtual machine via the Hyper-V host without a network connection via Windows PowerShell in the Windows Server 2016? a. Remote VM b. PowerShell Find c. PowerShell Direct d. PowerShell Remote

c. PowerShell Direct

What type of checkpoint is the default for Windows Server 2016? a. Standard b. General c. Production d. Lab

c. Production

Which of the following approaches is best when reserving at least 500 GB of space for a new storage space when there is only 100 GB of actual physical disk space? a. Wait until there is enough physical disk capacity to create the 500-GB storage space. b. Purchase new drives before creating the space. c. Use thin provisioning and create the larger space. Drives can be purchased later when needed. d. Configure one pool now and another when the drives are available.

c. Use thin provisioning and create the larger space. Drives can be purchased later when needed.

Server virtualization in Windows Server 2016 means each VM has its own a. disk partition, but uses the physical hardware. b. virtual hardware, but directly uses the physical memory. c. virtual hardware configuration and operating system. d. virtual hardware configuration, but uses the host operating system.

c. Virtual hardware configuration and operating system.

Which of the following is the maximum size file supported by Windows Deduplication? a. 100 MB b. 256 MB c. 10 GB d. 1 TB e. 10 TB

d. 1 TB

Which two files are used for every VM? a. A saved-state file and a virtual machine configuration (.vmc) file in INF format. b. A virtual machine configuration (.vmc) file in INF format and virtual hard disk (.vhd or .vhdx) files for the guest OS and data. c. A saved-state file and virtual hard disk (.vhd or.vhdx) files for the guest OS, applications, and data. d. A virtual machine configuration (.vmc) in XML format and virtual hard disk (.vhd/.vhdx) files for the guest OS and data.

d. A virtual machine configuration (.vmc) in XML format and virtual hard disk (.vhd/.vhdx) files for the guest OS and data.

In what type of storage QoS policy are the MinimumIOPS and the MaximumIOPS and Bandwidth shared among all flows assigned to the policy? a. Shared b. Dedicated c. Grouped d. Aggregated

d. Aggregated

Which tool is used to estimate the deduplication capacity savings on Windows? a. Server Manager b. Repadmin c. Deduplication Estimation Tool d. Deduplication Evaluation Tool

d. Deduplication Evaluation Tool

Which of the following is used to connect to a virtual machine similar to Remote Desktop Services (RDS), even if the virtual machine does not have network connectivity or have the Remote Desktop featured enabled? a. Discrete Device Assignment b. Non-Uniform Memory Access c. Secure Boot d. Enhanced session mode

d. Enhanced session mode

Which of the following statements best describes the primary purpose of the software package offered by Hyper-V called guest integration services? a. Guest integration services improves communications between the parent partition and child partitions. b. Guest integration services resolves compatibility issues of certain guest operating system experiencing nonfunctioning features. c. Guest integration services improves data exchange between the parent partition and child partitions. d. Guest integration services improves time synchronization between the parent partition and child partitions.

d. Guest integration services improves time synchronization between the parent partition and child partitions.

Which method of file sharing is used with UNIX and Linux machines? a. SMB b. CIFS c. NTFS d. NFS

d. NFS

Which Windows PowerShell cmdlet must be executed to support Hyper-V nested virtualization? a. Execute-VMProcessor b. Set-NestedVirtualization c. Enable-NestedVirtualization d. Set-VMProcessor

d. Set-VMProcessor

Which operating systems can be installed on a VM? a. Windows Server 2012 R2 and newer. b. Windows Server 2008 and newer. c. Any Microsoft Windows edition. d. Several Microsoft products as week as Red Hat and SuSE Linux.

d. Several Microsoft products as week as Red Hat and SuSE Linux.

Windows Server 2016 uses a virtualization architecture called Type I virtualization. Choose the interaction between the host operating system (OS), physical hardware, and guest OS. a. Guest OS's access hardware through the host OS. b. Guest OS's request processor time from the host OS. c. Both guest OS's and the host OS access hardware through the hypervisor. d. The host OS accesses hardware through the hypervisor and then allocates it tot he guest OS's.

d. The host OS accesses hardware through the hypervisor and then allocates it to the guest OS's.

As far as Hyper-V is concerned, what is the difference between Standard and Datacenter editions of Windows Server 2016? a. The retail cost b. The number of VM's they support c. The number of OS's able to be installed as VM's. d. The number of VM's able to run Windows Server 2016.

d. The number of VM's able to run Windows Server 2016.

Which client connects to an iSCSI SAN? a. iSCSI target b. iSCSI source c. iSCSI receiver d. iSCSI initiator

d. iSCSI initiator

Which of the following is used to automatically discover, manage, and configure iSCSI devices? a. LUN b. IQN c. MPIP d. iSNS

d. iSNS


संबंधित स्टडी सेट्स

Resistance & Types of Resistance to Change

View Set

Maternity Chapter 13 Labor and Birth Processes

View Set

Chapter 2: Organizations That Shape Public Health

View Set

Federal Tax Considerations for Life Insurance + Annuities

View Set

Consumer Behavior Test 3 Practice Test

View Set

Chapter 41: Management of Patients with Intestinal and Rectal Disorders

View Set

Auditing Chapter 7- Internal Control Mcgraw Hill questions

View Set

Honors English 10 Semester 2 Final

View Set