Windows Server 2016 70-740
Hot add or remove for network adapters and memory
Provides increased management flexibility to allocate resources as required to virtual machines. Network adapters and virtual memory can be added to a running virtual machine.
Virtual machine configuration version
Provides virtual machine compatibility with Windows Server 2012 R2. Any virtual machines migrated from Windows Server 2012 R2 (such as during a rolling cluster upgrade) are not automatically updated from configuration version 5 to 6 to retain backward compatibility. After you update a virtual machine to version 6, it can only be hosted on Windows Server 2016.
Microsoft Network Driver Interface Specification (NDIS) Capture
This extension allows the capture of data that travels across a virtual switch.
System volumes
contains the hardware-specific files that the Windows operating system needs to load, such as Bootmgr and BOOTSECT.bak.
install image
contains the operating systems that you plan to deploy to client computers
Risk analysis
identifies risks and their probability of occurrence. also identifies single points of failure, such as an organization's disk drives, network switches, storage, or power supply.
capture image
is a boot image that you can use to start a reference computer, capture its system drive, and store it in a .wim file
SMB
is a client-server file-sharing protocol that Windows clients and servers use
User State Migration Tool (USMT)
is a collection of executable files that you can use to copy user state data from a computer. You can then restore that data onto a new installation of the Windows operating system
Docker
is a collection of open source tools, solutions, and cloud-based services that provide a common model for packaging, or containerizing, app code into a standardized unit for software development.
SATA
is a computer bus interface, or channel, for connecting the motherboard or device adapters to mass storage devices such as hard disk drives and optical drives
reference computer
is a computer that creates an image that you will later use to deploy an operating system to multiple computers.
Mirrored volumes
is a fault-tolerant volume that has all data duplicated onto two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, you can access the data from the remaining disk. However, you cannot extend a mirrored volume. Mirroring also is known as RAID-1.
Remote direct memory access (RDMA)
is a feature that requires hardware support in the network adapter, functions at full speed with low resource utilization
NFS
is a file-system protocol, which is based on open standards, and allows access to a file system over a network
Cluster
is a group of computers and storage devices that work together as a single organized system.
Fibre Channel
is a high-performance network technology that you use primarily to connect computers to SANs
Discrete device assignment
is a method for allowing guest virtual machines to communicate directly with PCIe devices
Remote Direct Memory Access (RDMA)
is a networking technology that provides high-throughput communication with minimum CPU usage
iSCSI
is a protocol that supports access to remote, SCSI-based storage devices over a TCP/IP network.
WSUS - Windows Server Update Services
is a server role included in the Windows Server 2016 operating system that downloads and distributes updates to Windows clients and servers
SCSI
is a set of standards for physically connecting and transferring data between computers and peripheral devices.
MPIO
is a storage network enhancement that provides multiple physical paths from a computer to a block storage provider, regardless of whether the storage attaches directly to the storage provider or is available over a network.
DSM
is a storage vendor software component that facilitates efficient interaction with backend storage.
Receive side scaling (RSS)
is a technology implemented in network drivers that allows distribution of network-receive processing across multiple central processing units (CPUs)
DNS round robin
is a technology that allows a DNS server to provide requesting clients with different IP addresses to the same hostname, in sequential order.
NLB cluster address
is a virtual address that is shared between the hosts in the NLB cluster
Striped volumes
is a volume that has data that is spread across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended, and is not fault tolerant. This means that the loss of one disk causes the immediate loss of all the data. Striping also is known as RAID-0.
Spanned volumes
is a volume that is created from the free disk space from multiple disks that are linked together. You can extend a spanned volume onto a maximum of 32 disks. You cannot mirror a spanned volume, and they are not fault-tolerant. Therefore, if you lose one disk, you will lose the entire spanned volume.
Simple volumes
is a volume that uses free space from a single disk. It can be a single region on a disk, or consist of multiple, concatenated regions. You can extend a simple volume within the same disk or extend it to additional disks. If you extend a simple volume across multiple disks, it becomes a spanned volume.
Dynamic witness
is a witness that dynamically has a vote, depending on the cluster's number of nodes.
HBA
is an add-on card or functionality that is built into a computer's motherboard to enable communication over a Fibre Channel or Ethernet network.
Initiator
is an iSCSI software component or host adapter on a server that provides access to iSCSI targets
DISM
is available as part of the Windows operating system, and you can use it to perform offline image servicing. This is a crucial process for maintaining images that an operating system deployment uses.
Nonauthoritative restore
when a single node in the cluster is damaged or rebuilt, and the rest of the cluster is operating correctly.
RAID-5 volumes
A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum of three or more disks. Parity also is striped across the disk array. If a physical disk fails, you can recreate the portion of the RAID-5 volume that was on that failed disk by using the remaining data and the parity. You cannot mirror or extend a RAID-5 volume.
Node
A Windows Server 2016 computer that is part of a failover cluster, and has the failover clustering feature installed.
Stretch Cluster
A cluster that has been extended so that different nodes in the same cluster reside in separate physical locations
Witness
A server that is participating in cluster voting when the number of nodes is even.
Service or application
A service that can be moved between cluster nodes (for example, a clustered file server can run on either node).
Docker Image
A stateless collection of root file system changes in the form of layered file systems that are stacked on one another.
What are two disk volume requirements when configuring dynamic disks?
A system volume for hardware-specific files that are required to start the server A boot volume for the Windows operating system files
Dockerfile
A text file that contains the commands that need to run to build a Docker image.
Roles that can be migrated to Server 2016
AD FS Role Servies, Hyper-V, DHCP, DNS, Network Policy Server, Print and Document Services, remote access, WSUS
Checkpoint
Allow Administrators to make a snapshot of a virtual machine at a particular point in time.
Discrete device assignment
Allows virtual machines to directly access peripheral component interconnect express (PCIe) devices in the Hyper-V host. For some devices like a solid-state drive (SSD), this can provide increased performance.
Nested virtualization
Allows you to enable the Hyper-V server role in a virtual machine running Windows Server 2016. This can be useful for test and education environments.
Windows PowerShell Direct
Allows you to run Windows PowerShell cmdlets on a virtual machine from the Hyper-V host. You do not need to configure any network connectivity to the virtual machine from the host.
Containers
Allows you to run multiple applications independently within a single operating system instance
Rolling Hyper-V cluster upgrade
Allows you to upgrade a Windows Server 2012 R2 Hyper-V cluster to Windows Server 2016 by adding nodes to an existing cluster. Virtual machines can be moved between nodes running Windows Server 2013 R2 and Windows Server 2016 during co-existence.
Server Consolidation
Analyse cohosting multiple roles. Determine if cohosting affects performance.
Storage pools
Are a collection of physical disks aggregated into a single logical disk, allowing you to manage the multiple physical disks as a single disk.
Production Checkpoint
Are created by using VSS and require starting from an offline state
Container image
As modifications are made to a containers file system or registry, these changes are captured in the container's sandbox
Microsoft Deployment Toolkit
Automate deployments of Sever 2016 or other Windows Operating Systems
ReFS
Backwards compatible with NTFS, Enhanced data verification and error correction. Supports larger files, directories, and volumes
FAT
Basic file System, Partition size limitations, FAT32 to enable larger disks, exFAT developed for flash drives
Basic Disks
Basic storage. Default Storage for Windows OS.is initialized for simple storage, and contains partitions, such as primary partitions and extended partitions. You can subdivide extended partitions into logical volumes.
File-level storage
CIFS and NFS are the primary communication protocols
VAMT
Can be used to generate license reports and manage client and server activation on enterprise networks
RAID
Combines Multiple disks into a single logical unit to provide fault tolerance and performance.
Clients
Computers that connect to the failover cluster and are not aware which node the service is running on.
Server 2016 Install Check List
Configure IP, Set computer name, join to domain, configure time, enable updates, add roles/features, Enable RDP, configure Firewall
Optimization
Consisting of multiple jobs, they perform both deduplication and compression of files according to the data deduplication policy for the volume.
Semi-Annual Channel
Contains new or updated features released every 6 months. Only available with MS SA Agreement
Standard Checkpoint
Create differencing disks, .avhd files, which merge back into the previous checkpoint when the checkpoint is deleted.
Scrubbing
Data Deduplication has built-in data integrity features such as checksum validation and metadata consistency checking. It also has built-in redundancy for critical metadata and for the most popular data chunks.
Container repository
Each time you make a container image, the container image and its dependencies are stored in a local repository. This allows you to reuse the image many times on the container host.
Application Compatibility Toolkit (ACT)
Enables software developers, independent software vendors, and IT professionals who work in an enterprise environment to determine whether their applications are compatible with a new version of the Windows operating system
Shared storage
External storage that is accessible to all cluster nodes.
Storage Replica
Failover clustering feature. Allow us to replicate storage from one SAN to another SAN over WAN
Arbitrated loop
Fibre Channel hosts and storage devices connect in a ring, and you do not need switches
Start order priority
Improves Hyper-V host and virtual machine performance after restarts by identifying a specific startup order for virtual machines. This reduces resource contention and allows you to start the most important virtual machines first.
Storage Quality of Service (QoS)
Improves Hyper-V host and virtual machine performance after restarts by identifying a specific startup order for virtual machines. This reduces resource contention and allows you to start the most important virtual machines first.
Hyper-V Manager improvements
Improves manageability of Hyper-V hosts by allowing for alternate credentials when connecting to a Hyper-V host. Allows you to manage some previous versions of Hyper-V. Hyper-V Manager has been updated to use HTTP-based Web Services-Management (WS-MAN) for management instead of remote procedure calls (RPC) to simplify connectivity.
Production checkpoints
Improves the functionality of checkpoints by ensuring that applications are in a consistent state when the checkpoint is created.
Virtual machine configuration file format
Increases efficiency of read and write operations to the virtual machine configuration file with a binary format instead of the previous XML format. This also prevents administrators from making manual changes to the configuration file.
Linux Secure Boot
Increases security for Linux virtual machines. Secure Boot verifies digital signatures on files during the boot process to prevent malware. This feature was already available for Windows-based virtual machines.
Docker container
Is software wrapped in a complete file system that includes everything it needs to run: code, runtime, system tools, and system libraries, or anything you can install on a server
Thin Image
It contains only the operating system and the necessary settings for a computer to be used in a network environment, and do not contain any installed applications.
Thick images
It contains the operating system and every application required by the end user
Fibre Channel over Ethernet
It is becoming more popular, because it offers outstanding performance, particularly when you use it over your inexpensive, and often preexisting, Ethernet infrastructure.
Hot add memory
It provides the ability to change the memory allocated to a virtual machine while the virtual machine is running.
Quick Migration
It requires that you install and configure the failover clustering. During the migration process, when you use this method to move virtual machines between cluster nodes, a virtual machine is placed in a saved state. This causes some downtime until it copies the memory content to another node and restores the machine from the saved state.
GPT
Max 128 partitions per drive, a partition can have up to 18 exabytes. Up to 8 Zettabytes, with 512KB of LBA
NTFS
Metadata, Auditing & Journaling, Security(ACLs & Encryption)
Server Core Benefits
More Secure.Reduced update requirements. Reduced hardware footprint. Smaller attack surface.
Migrating to Server 2016
Must migrate from x86 version of Windows server. Can use Server Migration Tools feature
What should you consider when planning an iSCSI deployment?
Network speed and performance High availability Security Vendor information Infrastructure staff Application teams
Reset-PhysicalDisk
PowerShell Command Removes a physical disk from a storage pool.
Get-VirtualDisk | Get-PhysicalDisk
Powershell Command that lists physical disks that are used for a virtual disk.
Get-StoragePool
Powershell Command that lists storage pools
Get-PhysicalDisk | Where {$_.HealthStatus -ne "Healthy"}
Powershell Command that lists unhealthy physical disks
Get-VirtualDisk
Powershell Command that lists virtual disks
Repair-VirtualDisk
Powershell Command that repairs virtual disks
Optimize-Volume
Powershell command that Optimizes a volume, performing such tasks on supported volumes and system SKUs as defragmentation, trim, slab consolidation, and storage tier processing.
iSCSI targets
Present or advertise storage, similar to controllers for hard-disk drives of locally attached storage. However, servers access this storage over a network, rather than accessing it locally.
Host resource protection
Prevents a virtual machine from monopolizing all of the resources on a Hyper-V host. This ensures that the Hyper-V host and other virtual machines have sufficient resources to function. This feature is not enabled by default.
Shielded virtual machines
Secures virtual machines from Hyper-V host administrators. The entire virtual machine is encrypted and is accessible only to the administrators of that virtual machine.
In what ways does Data Deduplication help you to achieve capacity scaling and data optimization?
Segments data into small, variable-sized chunks Identifies duplicate chunks Replaces redundant copies with a reference Compresses chunks
Integration services delivered through Windows Update
Simplifies management of virtual machines by delivering the most recent version of integration services through a standardized mechanism. Previously, integration services were distributed as an ISO image with Hyper-V and the software needed to be deployed to update it.
Automatic Activation
Suitable when deploying a large number of servers
Manual Activation
Suitable when deploying a small number of servers
MBR
Supports Max of 4 Primary partitions per drive, 2TB max size.
Storage Spaces Direct
Take multiple disk put together to combine into storage pools. Disks can come from multiple servers to combine into one array
SConfig cmd Interface
Text mode only interface. Allows and simplifies configuration of common settings on Server(Mainly core)
Asynchronous Replication
The host receives a write complete response from the primary storage after the data is written successfully on the primary storage. The data writes to the secondary storage on a different schedule, depending on the hardware or software vendor's implementation
synchronous replication
The host receives a write complete response from the primary storage after the data is written successfully to both locations, data on both storage systems are identical.
Docker Datacenter
The latest addition to the stable of Docker solutions, DDC is an integrated, end-to-end platform for deploying Containers as a Service on-premises or in a virtual private cloud. The self-service capabilities of DDC make it easy for developers to build, test, deploy, and manage agile apps.
Quorum
The number of elements that must be online for a cluster to continue to run. The quorum is determined when cluster nodes vote.
Docker Build
The process of building Docker images from a Dockerfile and any other files in the directory where the image is being built.
Failback
The process of moving cluster resources back from the second node to the first node, as a result of the first node going online again or an administrator's action. If the service or application fails over from Node1 to Node2, when Node1 is again available, the service or application will fail back to Node1.
Failover
The process of moving cluster resources from the first node to the second node, as a result of node failure or administrator's action.
Hyper-V containers
These containers expand on the isolation that Windows Server containers provide by running each container in a highly optimized virtual machine (VM)
Windows Server containers
These containers provide app isolation through process and namespace isolation technology. share the OS kernel with the container host and with all other containers that run on the host.
Kitematic
This GUI can help you to quickly build and run Docker containers and to find and pull images from the Docker Hub
integration services
This allows the guest operating system to use the virtual hardware provided by Hyper-V, also have access to services provided by Hyper-V.
Expand-DedupFile
This cmdlet expands or undeduplicate, an optimized file into its original location
Start-DedupJob
This cmdlet is used to launch ad hoc deduplication jobs, such as optimization, garbage collection, scrubbing, and unoptimization.
Measure-DedupFileMetadata
This cmdlet is used to measure potential disk space on a volume. More specifically, this cmdlet returns how much disk space you can reclaim on a volume if you delete a group of folders and subsequently run a garbage collection job.
Trace-xDscOperation
This cmdlet returns an object containing a collection of events, their event types, and the message output generated from a particular DSC operation.
Get-DedupMetadata
This cmdlet returns status information of the deduplicated data store for volumes that have data deduplication metadata, which includes the number of data chunks in a container, the number of containers in the data store, the number of data streams in a container, number of containers in the stream map store, the number of hotspots in a container, the number of hotspots in the stream map store, and the number of corruptions on the volume.
Get-DedupJob
This cmdlet returns the deduplication status and information for currently running or queued deduplication jobs.
Get-DedupVolume
This cmdlet returns the deduplication status for volumes that have data deduplication metadata. The metadata includes the deduplication rate, the number/sizes of optimized files, and deduplication settings such as minimum file age, minimum file size, excluded files/folders, compression-excluded file types, and the chunk redundancy threshold.
Update-DedupStatus
This cmdlet scans volumes to compute new Data Deduplication information for updating the metadata.
Docker commit
This commits the changes you made to the container and creates a new container image.
Replication engine
This component is the core of Hyper-V Replica. It manages the replication configuration details and handles initial replication, delta replication, failover, and test-failover operations.
Change tracking
This component tracks changes that are happening on the primary copy of the virtual machine. It is designed to make the scenario work regardless of where the virtual machine VHD file or files reside.
docker run
This creates a container by using a container image.
Filter driver
This deduplication component monitors local or remote I/O and handles the chunks of data on the file system by interacting with the various jobs. There is one filter driver for every volume.
Container host
This element consists of the physical or virtual computer that is configured with the Windows containers feature
Data Center Bridging Capabilities eXchange (DCBX) protocol
This enables devices such as the network adapters and switches to communicate and share capabilities and configuration information.
Docker Compose
This enables you to define a multiple-container app together with any dependencies so that you can run it with a single command. Lets you specify the images your app will use with any necessary volumes or networks.
Docker Machine
This enables you to provision Docker hosts by installing the Docker Engine on a computer in your datacenter or at a cloud provider.
Microsoft Windows Filtering Platform
This extension allows filtering of data that travels across a virtual switch.
Get-xDscOperation
This function lets you find the results of the DSC operations that run on one or multiple computers, and returns an object that contains the collection of events produced by each DSC operation.
Docker client
This includes a command shell that is preconfigured as a Docker command-line environment.
Docker Hub
This is a cloud-hosted service where you can register your Docker images and share them with others
Docker Engine
This is a lightweight runtime environment for building and running Docker containers.
Exporting and importing virtual machines
This is an established method of moving virtual machines without using a cluster. You export a virtual machine on one host and then, move exported files physically to another host by performing an import operation.
Cluster Network Delay
This is the frequency of the cluster heartbeats, such as the number of seconds before the next heartbeat is sent
Cluster Network Threshold
This is the number of missed heartbeats before the cluster initiates a failover procedure.
Sandbox
This layer consists of all the changes made to the container, including file system modifications, registry modifications, or software installations.
Host Clustering
This means that the guest operating system and applications that run within the VM do not have to be cluster-aware. However, the VM is still highly available.
Network module
This module provides a secure and efficient way to transfer virtual machine replicas between the primary host and the replica host. Data compression is enabled by default. HTTPS and certification-based authentication secures this communication.
Docker Swarm
This native clustering capability allows you to combine multiple Docker Engines into a single virtual Docker Engine.
Docker Registry
This open source app forms the basis for the Docker Hub and Docker Trusted Registry
Docker Trusted Registry
This private, dedicated image registry lets you store and manage images on-premises or in a virtual private cloud.
Deployment Server
This role service manages end-to-end Windows operating system deployment solutions, including a PXE component.
Transport Server
This role service provides basic network services and a PXE listener
Data Deduplication
This service identifies and removes duplications within data without compromising data integrity. It does this to achieve the ultimate goals of storing more data and using less physical disk space.
Docker stop
This stops a container. The Windows PowerShell cmdlet equivalent to this command is Stop-Container.
Differencing
This type of dynamically expanding virtual hard disk stores data that has changed when compared to a parent disk. are typically used to reduce data storage requirements.
Fixed-size
This type of virtual hard disk allocates all of the space immediately. This minimizes fragmentation, which, in turn, enhances performance.
Dynamically expanding
This type of virtual hard disk allocates space as required, which is more efficient because there is no blank space in a virtual hard disk.
Pass-through
This type of virtual hard disk provides direct access to a physical disk or Internet SCSI (iSCSI) logical unit number (LUN).
Enter-PSSession -VMName VM1
To enter a session on a virtual machine
Invoke-Command -VMName VM1 -ScriptBlock {Windows PowerShell commands}
To invoke a command on a virtual machine
Update-VMVersion "vmname"
To update the version of a single virtual machine, run the following command from an elevated Windows PowerShell command prompt
MAP
Tools analyzes the inventory of an organization's server infrastructure and creates reports that you can use for upgrade and migration plans?
LTSC Channel
Traditional deployment and versioning. Available in Server Core or Server with Desktop Experience models.
Upgrading to Server 2016
Upgrade from 2008 R2 or later. Upgrade to same or newer editions. Requires same processor architecture.
Private Virtual Switch
Used only to communicate between virtual machines on a Hyper-V host. You cannot use these switches to communicate between the virtual machines and the Hyper-V host.
Internal Virtual Switch
Used to communicate between the virtual machines on a Hyper-V host and to communicate between the virtual machines and the Hyper-V host itself.
Windows Server Migration Tools
Used to migrate server roles, features, OS settings, data, and shares
VMMQ
VMQ by allocating multiple queues per virtual machine and spreading traffic across the queues.
Guest Cluster Across Hosts
When you implement failover clustering at both the host and virtual machine levels, the resource can restart regardless of whether the node that fails is a virtual machine or a host.
Raid 5 + 0
Which RAID level should you recommend to provide high fault tolerance, capacity, and random positioning performance
RAID 1+0
Which RAID level should you recommend when performance and redundancy are critical and the cost of the required additional disks is acceptable
Update-ClusterFunctionalLevel
Windows PowerShell command that upgrades the cluster's functional level.
Docker Cloud
With this cloud-hosted service, you can directly deploy and manage your Docker apps
Virtual Machine and Storage Migration
With this method, you move a powered-on virtual machine from one location to another or from one host to another by using the Move Virtual Machine Wizard in Hyper-V Manager.
switch-embedded teaming (SET)
You can combine network adapters into a team by creating a virtual switch with up to 8 network adapters. All of the network adapters in a team must be identical with the same firmware version and driver.
Set-SMBbandwidthlimit
You can configure bandwidth limits for live migration to optimize network bandwidth during the live migration process by using the Windows PowerShell cmdlet
Universal Control Panel
You can use this to manage Docker apps regardless of whether they are running on-premises or within a virtual private cloud.
External Virtual Switch
You use this type of switch to map a network to a specific network adapter or network adapter team in the Hyper-V host. This provides virtual machines with access to a network that the host is connected to.
point-to-point deployment
a Fibre Channel host connects directly to a storage device, and you do not need switches.
Dynamic Disks
a disk that you initialize for dynamic storage, and that contains dynamic volumes. Dynamic disks are used for configuring fault tolerant storage.
Failover Cluster
a group of independent computers that work together to increase the availability of applications and services.
SAN
a high speed network that connects computer systems or host servers to high-performance storage subsystems
Volume
a storage unit that is made from free space on one or more disks. You can format the volume with a file system and then assign it a drive letter, or configure it with a mount point.
Hot Data
commonly referred to as working set, is files that are currently being worked on; this part of the data set is highly active and changes over time.
default host
configure NLB to direct traffic to a specific host
Boot Volumes
contains the Windows operating system files that are in the %Systemroot% and %Systemroot%\System32 folders.
iSCSI initiator
acts as a local disk controller for the remote disks
Dynamic memory
allows you to configure Hyper-V so that a virtual machine is allocated as much memory as it needs.
Resource metering
allows you to track the resource utilization of virtual machines hosted on Windows Server 2016 computers that have the Hyper-V role installed.
Microservices
are an approach to app development where every part of an app deploys as a fully self-contained component
Containers
are an isolated operating environment that you can use to provide a controlled and portable space for an app.
SSD
are data storage devices that use solid-state memory to store data rather than using the spinning disks and movable read/write heads that are used in other disks.
Virtual hard disks
are files that represent a traditional hard disk drive.
iSCSI qualified name (IQN).
are unique identifiers that iSCSI uses to address initiators and targets on an iSCSI network.
Storage spaces
are virtual disks created from free space in a storage pool
Drainstop action
blocks all new connections without terminating existing sessions. After all current sessions end, the NLB service stops.
SMB
client-server file-sharing protocol is found on multiple platforms and includes an open‑source version
Nested virtualization
converts a Hyper-V guest virtual machine to a Hyper-V host so that it can host other guest virtual machines.
Block-level storage
delivered to servers via a SAN, most often by using one of the SAN communication protocols, such as iSCSI, Fibre Channel, or Fibre Channel over Ethernet. Storage administrators create storage volumes out of chunks of block-level storage
SAS
depends on a point-to-point serial protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set.
High availability
describes components and technologies that need to be redundant so that the solution continues to work in a case of failure of any of the solution's components.
Business impact analysis
determines an organization's critical business processes and the potential damage or loss that can result from their disruption or failure.
DAS
disks that are physically located inside the server or that connect directly with an external array, or disks that connect to the server with a universal serial bus (USB) cable or an alternative connector.
NLB
distributes network traffic across a set of servers, balancing the workload each server must handle. It is scalable because it enables you to add additional servers (also called nodes or hosts)
PowerShell Direct
does not require a network connection to do Windows PowerShell remoting from the Hyper-V host on which the virtual machine is running.
Shared Nothing Live Migration
does not require failover clustering. In addition, hosts do not have to share any storage for this type of migration to be performed.
Failover Clustering
enables a group of independent servers to work together to increase the availability of applications and services. If a server cluster, or node, fails, then another node begins to provide services.
Host clustering
enables you to configure a failover cluster by using the Hyper-V host servers. You implement failover protection at the host-server level.
Live Migration
enables you to migrate a virtual machine from one host to another without experiencing downtime.
NFS
file-system protocol is based on open standards and allows access to a file system over a network
iSNS server
has a database with a collection of information about storage devices and where that storage has been allocated.
QoS
helps to ensure that all virtual machines are able to obtain a minimum level of network capacity when required.
Windows Assessment Toolkit
helps you assess a running operating system, determine its status, review results in a report, diagnose problems or issues, and helps you correct the problems or issues.
Docker rm
his removes a container. The Windows PowerShell cmdlet equivalent to this command is Remove-Container.
Guest failover
is configured similarly to a physical-server failover clustering, except that the cluster nodes are virtual machines. In this scenario, you create two or more virtual machines and enable failover clustering within the guest operating system
Cold Data
is files that are accessed infrequently, and have a longer life span.
Storage layout
is one of the characteristics that defines the number of disks from the storage pool that are allocated.
Recovery time objective (RTO)
is the amount of time that it takes to recover from failure.
Container OS image
is the first layer in potentially multiple image layers that make up a container
Windows PE
is the initial operating system that you use during a Windows operating system deployment
Docker
is the management software for containers
Scaling
is the process of increasing the capacity of an NLB cluster
Convergence
is the process where a new list of cluster members is created and the cluster members record the current configuration of the cluster
Garbage Collection
jobs to process deleted or modified data on the volume so that any data chunks no longer referenced are cleaned up
Retention objectives
measure the length of time to store backed-up data
Switched fabric.
most common Fibre Channel. All Fibre Channel hosts connect to Fibre Channel switches, and the Fibre Channel switches connect to the backend storage.
DCB
provides a standard by which you can combine these networks into a single physical infrastructure that supports Ethernet, Fibre Channel, Infiniband networks and iSCSI
Scale-Out File Server
provides continuously available storage for file-based server applications
iSNS
provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks
Relaxed monitoring
provides more tolerance in network-failure detection, which means that in some cases of very short network outage, a cluster's nodes do not initiate a failover procedure
Aggressive monitoring
provides the fastest detection of server failure and also provides fast recovery, which means this type of monitoring provides the highest level of availability.
Continuous availability
results from technologies and procedures that ensure that an IT solution continues to work in a case of failure scenarios and planned maintenance downtime.
Windows PowerShell DSC
set of Windows PowerShell extensions, cmdlets, and resources that supports managing remote computers in a scalable and standardized manner by pushing or pulling declarative configurations?
Recovery point objective (RPO)
sets a limit on how much data you lose due to failure.
SAN
storage method reads and writes at block levels and provides a high level of redundancy
NAS
storage that connects to a dedicated storage device and is then accessed over the network.
Stop action
terminates all existing connections to the cluster node and stops the NLB service
Enhanced Integrated Drive Electronics (EIDE).
there is a 128 GB limitation on storag. Speed is limited to a maximum of 133 megabytes (MB) per second (mbps). Are seldomly used today.
Get-DedupStatus
this cmdlet returns the deduplication status for volumes which have data deduplication metadata, which includes the deduplication rate, the number/sizes of optimized files, the last run-time of the deduplication jobs, and the amount of space saved on the volume.
Smart Paging
uses disk paging for additional temporary memory when virtual machines are starting and need more memory than the host can allocate
virtual machine queue (VMQ)
uses hardware packet filtering to deliver network traffic directly to a virtual machine
Validation Wizard
verifies whether every component of the failover cluster node meets the hardware, network, infrastructure, and software requirements
LUNs
virtual storage areas.
Authoritative restore
when you must roll back the cluster configuration. For example, if an administrator accidentally removed clustered resources or modified other cluster settings, and you need to revert the cluster to a previous point in time
dynamic quorum
which refers to the dynamic adjustment of quorum votes on the basis of how many servers are online
Hot add network adapter
you can add or remove network adapters from a running virtual machine.
Guest clustering
you create two or more VMs, install, and implement failover clustering within the guest operating systems