1372 Chapter 4 Terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When you want to configure Storage Replica for a stretched cluster in Failover Cluster Manager, perform the following steps:

1.Add a source data disk to a role or CSV 2.Enable replication on the source data disk. 3.Select a destination data disk. 4.Select a source log disk. 5.Select a destination log disk.

When creating a storage space, how many disks are needed when setting up parity for resiliency settings in a storage pool? a.2 b.3 c.5 d.4

3

Which port is used by iSCSI?a.1080 b.8080 c.3260 d.4800

3260

Specify the correct order of the IQN components that make up an IQN string. ____ microsoft _____ 1992-03 _____ iqn _____ :storage01-targetnew-target _____ com

4____ microsoft 2_____ 1992-03 1_____ iqn 5_____ :storage01-targetnew-target 3_____ com

Specify the correct order of steps necessary to creating an iSCSI virtual disk. Not all steps will be used. _____ Specify the access servers. _____ Specify the IP address of the iSCSI volumes. _____ Specify the size of the virtual disk. _____ Specify the location of the iSCSI virtual disk. _____ Specify the IPsec password. _____ Specify the name of the iSCSI virtual disk. _____ Specify the type of volume.

4_____ Specify the access servers. 3_____ Specify the size of the virtual disk. 1_____ Specify the location of the iSCSI virtual disk. 2_____ Specify the name of the iSCSI virtual disk.

The requirements for a stretch cluster Cont 2

A minimum of 4 GB of random access memory (RAM) in each server with at least two cores. A firewall that is configured to allow Internet Control Message Protocol (ICMP), SMB (port 445, plus 5445 for SMB Direct), and WS-MAN (port 5985) bidirectional traffic between all nodes. A network between the two sets of servers with at least 1-Gbps throughput (preferably 8 Gbps or higher) and an average of less than or equal to 5-milliseconds (ms) round-trip latency. Local administrator permissions on all server nodes.

Which protocol is used for authentication for iSCSI? a.PAP b.CHAP c.MS-CHAPv2 d.SPAP

CHAP

The requirements for a stretch cluster:

Domain-joined servers. Physical servers for the Stretch Cluster Hyper-V scenario. You can use virtual machines for server-to-server and cluster-to-cluster.

Data Center Bridging Capabilities eXchange(DCBX) protocol:

Enables devices such as the network adapters and switches to communicate and share capabilities and configuration information

Enhanced transmission selection:

Enables the system to reserve bandwidth for iSCSI and other network protocols

Which PowerShell cmdlet should be used to view the iSCSI initiatorconnections? a.Get-IscsiConnection b.Get-IscsiSession c.Get-IscsiTarget d.Connect-IscsiTarget

Get-IscsiConnection

Which of the following can be used to encrypt iSCSI traffic?a.CHAP b.IPsec c.BitLocker d.EFS

IPsec

Which of the following is a unique identifier that is used to identify iSCSI initiators and targets? a.iSNS b.IQN c.MPIO d.MPC

IQN

Get-VirtualDisk | Get-PhysicalDisk:

Lists physical disks that are used for a virtual disk

Get-StoragePool:

Lists storage pools

Get-PhysicalDisk| Where {$_.HealthStatus-ne "Healthy"}:

Lists unhealthy physical disks

Get-VirtualDisk:

Lists virtual disks

Which technologies can help make iSCSI highly available? (Choose two answers.) a.MCS b.EFS c.LUNX d.MPIO

MPIO

Congestion notification:

Manages congestion for protocols that do not have built-in control mechanisms

Asan administrator for the Contoso Corporation, you manage a large server that is running Windows Server 2016 and that has about 8 TB of disk space that you can allocate to be used by other servers. Describe how to configure the servers such that the two other servers running Windows Server 2016 can use the disk space just as if the disk space was local?

On the large server, you load the iSCSI Target Server role. You then configure the iSCSI Target Server using Server Manager. When you configure the server, you create multiple virtual disks and define which servers can use the virtual disk. Next, you configure the iSCSI initiators to connect to the volumes. Lastly, as you connect the virtual disk to each server, you use Computer Management to prepare the disks.

Optimize-Volume:

Optimizes a volume, performing such tasks on supported volumes and system SKUs as defragmentation, trim, slab consolidation, and storage tier processing

Reset-PhysicalDisk:

Removes a physical disk from a storage pool

Repair-VirtualDisk:

Repairs a virtual disk•

Which of the following statements are true of striped volumes? (Choose all that apply.) a.Striped volumes provide enhanced performance over simple volumes. b.Striped volumes provide greater fault tolerance than simple volumes. c.You can extend striped volumes after creation. d.If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Striped volumes provide enhanced performance over simple volumes. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.

Which of the following processes reserves space for future use when working with storage spaces/storage pools? a.Partitions b.Thin provisioning c.SMB blocks d.Provisioned storage blocks

Thin provisioning

When creating a storage space, which of the following resiliency settings requires at least five drives?a.Parity b.Three-way mirror c.Two-way mirror d.Simple

Three-way mirror

When creating storage spaces, which of the following types of resiliency works best for protection against two drives failing simultaneously while setting up storage spaces? a.Three-way mirror b.Two-way mirror c.Parity d.Simple

Three-way mirror

The requirements for a stretch cluster: Cont 1

Two sets of shared storage, using serial attached SCSI JBODs, Fibre Channel SAN, or iSCSI Target. Each storage set must be able to create at least two virtual disks, one for replicated data and one for logs. The sector size must be the same on all data disks on the physical storage. All the log disks must be of the same sector size, but not necessarily the same as the data disks. At least 1-Gigabit Ethernet (GbE) connection on each file server, preferably 10 GbE, iWARP, or InfiniBand.

Which of the following approaches is best when reserving at least 500 GB of space for a new storage space when there is only 100 GB of actual physical disk space? a.Wait until there is enough physical disk capacity to create the 500-GB storage space. b.Purchase new drives before creating the space. c.Use thin provisioning and create the larger space. Drives can be purchased later when needed. d.Configure one pool now and another when the drives are available.

Use thin provisioning and create the larger space. Drives can be purchased later when needed.

storage pool

When the drives are combined, Windows places them into a _______________________

Parity:

Writes data with parity information to protect against

Simple (no resiliency):

Writes one copy of your data but doesn't protect against drive failures; requires at least one drive

Three-way mirror:

Writes three copies of your data to protect against two simultaneous drive failures; requires at least five drives

Two-way mirror:

Writes two copies of your data to protect against a single drive failure; requires at least two drives

You have a new desktop running Windows Server 2016. However, you try to copy your file repository and find out that you do not have enough disk space. You have 400 GB of free disk space on your C drive and you have three smaller 500-GB drives. Describe the recommended course of action.

You can use the small drives and create a storage space and storage pool. Storage Spaces is a feature in Windows 10/Windows Server 2016that allows you to combine multiple disks into a single logical volume that can be mirrored to protect against one or more drive failures. When the drives are combined, Windows places them into a storage pool. These storage pools can then be segmented into multiple storage spaces, which are then formatted with a file system and can be used just like any other regular disk on your computer.

As an administrator, you are configuring an iSCSI Target Server role and multiple volumes that will be assigned to multiple servers using iSCSI initiators. Because these servers contain confidential information, you want to make sure that they are not accessed by other servers using an iSCSI initiator. Which of the following statements best describes the recommended course of action? a.You should specify the initiator ID that can connect when creating the iSCSI virtual disk. b.You should specify the initiator ID that can connect when creating the iSCSI target. c.You should enable IPsec. d.You should configure the iSCSI ACL list when he configures the iSCSI initiator.

You should specify the initiator ID that can connect when creating the iSCSI target.

Specify the correct order of steps necessary to creating a storage pool. __7___Click Create pool. __1___Log on with administrative credentials. __6___Select the drive(s) you want to include in the new storage pool. __5___ClickCreate a new pool and storage space. __2___Connect the drives to your computer. __3__Press the Windows logo key + r, type Storage Spaces, and then select it from the Results list. __4___From the Results list, click Storage Spaces.

__7___Click Create pool. __1___Log on with administrative credentials. __6___Select the drive(s) you want to include in the new storage pool. __5___ClickCreate a new pool and storage space. __2___Connect the drives to your computer. __3__Press the Windows logo key + r, type Storage Spaces, and then select it from the Results list. __4___From the Results list, click Storage Spaces.

Which of the following drives can be added to a storage pool? (Choose all that apply.) a.SATA b.eSATA c.USB d.SCSI

a.SATA b.eSATA c.USB d.SCSI

fill and spill volumes

because all of the storage space on the first disk must be filled before data is stored on the second and subsequent disks

SCSI Target Storage Provider

enables applications on a server that is connected to an iSCSI target to perform volume shadow copies of data on iSCSI virtual disks. It also enables you to manage iSCSI virtual disks by using older applications that require a Virtual Disk Service (VDS) hardware provider, such as using the DiskRAID command-line tool.

Multiple connected session (MCS)

enables multiple TCP/IP connections from the initiator to the target for the same iSCSI session

Shared storage devices

have many hard drives to provide huge amounts of disk space.

Which protocol allows a server to connect to a SAN by sending SCSI commands over a TCP/IP network? a.Fibre Channel b.iSCSI c.SATA d.MPIO

iSCSI

Which client connects to an iSCSI SAN?a.iSCSI target b.iSCSI source c.iSCSI receiver d.iSCSI initiator

iSCSI initiator

Which of the following can be installed so that Windows Server 2016 can be used to present iSCSI volumes to Windows servers? a.iSCSI target b.iSCSI source c.iSCSI receiver d.iSCSI initiator

iSCSI target

Which of the following is used to automatically discover, manage, and configure iSCSI devices?a.LUN b.IQN c.MPIP d.iSNS

iSNS

A company uses nearly 30 servers, all running Windows Server 2016 and each using iSCSI storage. The small team of administrators is complaining that it is becoming difficult to locate the available iSCSI resources on the network. Which of the following can be used to help the administrators quickly locate iSCSI resources? a.DNS b.iSNS c.iSCSITarget Storage Provider d.Windows Standard-Based Storage Management feature

iSNS c.iSCSITarget Storage Provider

Spanned volumes

include two or more disks (up to 32) that are represented in Windows Explorer as a single drive letter.

A stretch cluster

is a Hyper-V cluster with nodes and storage in two locations. The cluster provides redundancy where the service provided by the cluster is still available, although one of the nodes is down or is not accessible.

Storage Spaces

is a feature in Windows Server 2016 that allows you to combine multiple disks into a single logical volume that can be mirrored to protect against one or more drive failures.

Network attached storage (NAS)

is a file-level data storage device that is connected to the server over a computer network to provide shared drives or folders, usually using Server Message Block (SMB) or Network File System (NFS).

Internet Small Computer System Interface (iSCSI)

is a protocol that enables clients to send SCSI commands over a TCP/IP network using TCP port 3260.

Storage area network (SAN)

is a storage architecture that allows systems to attach to the storage in the SAN and presents the drives to the server just as if the drives were locally attached.

Data Center Bridging (DCB)

is a suite of Institute of Electrical and Electronics Engineers (IEEE) standards that supports converged networks so network traffic can get sufficient bandwidth allocation, while maintaining reliability.

Storage Replica

is new in Windows Server 2016 and can be used to synchronize data on a block level on two independent storage units.

Server-to-server replication

is one of the simplest uses of storage replication where it replicates storage from one server to another server's storage. The requirements for server-to-server replication:

striped volume

is similar to creating a spanned volume in that almost all of the steps are the same. However, the way data is stored on a striped volume is different from a spanned volume

A cluster-to-cluster replication

is when one failover cluster replicates its storage to another cluster.

Internet Storage Name Service (iSNS)

protocol is used to discover, manage, and configure iSCSI devices automatically on a TCP/IP network.

SCSI Target Server

provides tools to create and manage iSCSI targets and virtual disks. Enabling iSCSI Target Server can provide application block storage, consolidate remote storage, provide for diskless boots, and run in a failover cluster environment.

converged network

shares a single network infrastructure that handles storage, data, voice, video, cluster, and management traffic.

With tiered storage,

you can combine the two types of disks into one virtual disk and volume.


Set pelajaran terkait

Exam 1 Study Guide Chapters 1-9 IPN

View Set

Anatomy - Ch 11 (Muscular System)

View Set

Wheels in Motion Defensive Driving Exam and Quizzes

View Set