Windows Server 2016 70-740

Ace your homework & exams now with Quizwiz!

Hot add or remove for network adapters and memory

Provides increased management flexibility to allocate resources as required to virtual machines. Network adapters and virtual memory can be added to a running virtual machine.

Virtual machine configuration version

Provides virtual machine compatibility with Windows Server 2012 R2. Any virtual machines migrated from Windows Server 2012 R2 (such as during a rolling cluster upgrade) are not automatically updated from configuration version 5 to 6 to retain backward compatibility. After you update a virtual machine to version 6, it can only be hosted on Windows Server 2016.

Microsoft Network Driver Interface Specification (NDIS) Capture

This extension allows the capture of data that travels across a virtual switch.

System volumes

contains the hardware-specific files that the Windows operating system needs to load, such as Bootmgr and BOOTSECT.bak.

install image

contains the operating systems that you plan to deploy to client computers

Risk analysis

identifies risks and their probability of occurrence. also identifies single points of failure, such as an organization's disk drives, network switches, storage, or power supply.

capture image

is a boot image that you can use to start a reference computer, capture its system drive, and store it in a .wim file

SMB

is a client-server file-sharing protocol that Windows clients and servers use

User State Migration Tool (USMT)

is a collection of executable files that you can use to copy user state data from a computer. You can then restore that data onto a new installation of the Windows operating system

Docker

is a collection of open source tools, solutions, and cloud-based services that provide a common model for packaging, or containerizing, app code into a standardized unit for software development.

SATA

is a computer bus interface, or channel, for connecting the motherboard or device adapters to mass storage devices such as hard disk drives and optical drives

reference computer

is a computer that creates an image that you will later use to deploy an operating system to multiple computers.

Mirrored volumes

is a fault-tolerant volume that has all data duplicated onto two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, you can access the data from the remaining disk. However, you cannot extend a mirrored volume. Mirroring also is known as RAID-1.

Remote direct memory access (RDMA)

is a feature that requires hardware support in the network adapter, functions at full speed with low resource utilization

NFS

is a file-system protocol, which is based on open standards, and allows access to a file system over a network

Cluster

is a group of computers and storage devices that work together as a single organized system.

Fibre Channel

is a high-performance network technology that you use primarily to connect computers to SANs

Discrete device assignment

is a method for allowing guest virtual machines to communicate directly with PCIe devices

Remote Direct Memory Access (RDMA)

is a networking technology that provides high-throughput communication with minimum CPU usage

iSCSI

is a protocol that supports access to remote, SCSI-based storage devices over a TCP/IP network.

WSUS - Windows Server Update Services

is a server role included in the Windows Server 2016 operating system that downloads and distributes updates to Windows clients and servers

SCSI

is a set of standards for physically connecting and transferring data between computers and peripheral devices.

MPIO

is a storage network enhancement that provides multiple physical paths from a computer to a block storage provider, regardless of whether the storage attaches directly to the storage provider or is available over a network.

DSM

is a storage vendor software component that facilitates efficient interaction with backend storage.

Receive side scaling (RSS)

is a technology implemented in network drivers that allows distribution of network-receive processing across multiple central processing units (CPUs)

DNS round robin

is a technology that allows a DNS server to provide requesting clients with different IP addresses to the same hostname, in sequential order.

NLB cluster address

is a virtual address that is shared between the hosts in the NLB cluster

Striped volumes

is a volume that has data that is spread across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended, and is not fault tolerant. This means that the loss of one disk causes the immediate loss of all the data. Striping also is known as RAID-0.

Spanned volumes

is a volume that is created from the free disk space from multiple disks that are linked together. You can extend a spanned volume onto a maximum of 32 disks. You cannot mirror a spanned volume, and they are not fault-tolerant. Therefore, if you lose one disk, you will lose the entire spanned volume.

Simple volumes

is a volume that uses free space from a single disk. It can be a single region on a disk, or consist of multiple, concatenated regions. You can extend a simple volume within the same disk or extend it to additional disks. If you extend a simple volume across multiple disks, it becomes a spanned volume.

Dynamic witness

is a witness that dynamically has a vote, depending on the cluster's number of nodes.

HBA

is an add-on card or functionality that is built into a computer's motherboard to enable communication over a Fibre Channel or Ethernet network.

Initiator

is an iSCSI software component or host adapter on a server that provides access to iSCSI targets

DISM

is available as part of the Windows operating system, and you can use it to perform offline image servicing. This is a crucial process for maintaining images that an operating system deployment uses.

Nonauthoritative restore

when a single node in the cluster is damaged or rebuilt, and the rest of the cluster is operating correctly.

RAID-5 volumes

A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum of three or more disks. Parity also is striped across the disk array. If a physical disk fails, you can recreate the portion of the RAID-5 volume that was on that failed disk by using the remaining data and the parity. You cannot mirror or extend a RAID-5 volume.

Node

A Windows Server 2016 computer that is part of a failover cluster, and has the failover clustering feature installed.

Stretch Cluster

A cluster that has been extended so that different nodes in the same cluster reside in separate physical locations

Witness

A server that is participating in cluster voting when the number of nodes is even.

Service or application

A service that can be moved between cluster nodes (for example, a clustered file server can run on either node).

Docker Image

A stateless collection of root file system changes in the form of layered file systems that are stacked on one another.

What are two disk volume requirements when configuring dynamic disks?

A system volume for hardware-specific files that are required to start the server A boot volume for the Windows operating system files

Dockerfile

A text file that contains the commands that need to run to build a Docker image.

Roles that can be migrated to Server 2016

AD FS Role Servies, Hyper-V, DHCP, DNS, Network Policy Server, Print and Document Services, remote access, WSUS

Checkpoint

Allow Administrators to make a snapshot of a virtual machine at a particular point in time.

Discrete device assignment

Allows virtual machines to directly access peripheral component interconnect express (PCIe) devices in the Hyper-V host. For some devices like a solid-state drive (SSD), this can provide increased performance.

Nested virtualization

Allows you to enable the Hyper-V server role in a virtual machine running Windows Server 2016. This can be useful for test and education environments.

Windows PowerShell Direct

Allows you to run Windows PowerShell cmdlets on a virtual machine from the Hyper-V host. You do not need to configure any network connectivity to the virtual machine from the host.

Containers

Allows you to run multiple applications independently within a single operating system instance

Rolling Hyper-V cluster upgrade

Allows you to upgrade a Windows Server 2012 R2 Hyper-V cluster to Windows Server 2016 by adding nodes to an existing cluster. Virtual machines can be moved between nodes running Windows Server 2013 R2 and Windows Server 2016 during co-existence.

Server Consolidation

Analyse cohosting multiple roles. Determine if cohosting affects performance.

Storage pools

Are a collection of physical disks aggregated into a single logical disk, allowing you to manage the multiple physical disks as a single disk.

Production Checkpoint

Are created by using VSS and require starting from an offline state

Container image

As modifications are made to a containers file system or registry, these changes are captured in the container's sandbox

Microsoft Deployment Toolkit

Automate deployments of Sever 2016 or other Windows Operating Systems

ReFS

Backwards compatible with NTFS, Enhanced data verification and error correction. Supports larger files, directories, and volumes

FAT

Basic file System, Partition size limitations, FAT32 to enable larger disks, exFAT developed for flash drives

Basic Disks

Basic storage. Default Storage for Windows OS.is initialized for simple storage, and contains partitions, such as primary partitions and extended partitions. You can subdivide extended partitions into logical volumes.

File-level storage

CIFS and NFS are the primary communication protocols

VAMT

Can be used to generate license reports and manage client and server activation on enterprise networks

RAID

Combines Multiple disks into a single logical unit to provide fault tolerance and performance.

Clients

Computers that connect to the failover cluster and are not aware which node the service is running on.

Server 2016 Install Check List

Configure IP, Set computer name, join to domain, configure time, enable updates, add roles/features, Enable RDP, configure Firewall

Optimization

Consisting of multiple jobs, they perform both deduplication and compression of files according to the data deduplication policy for the volume.

Semi-Annual Channel

Contains new or updated features released every 6 months. Only available with MS SA Agreement

Standard Checkpoint

Create differencing disks, .avhd files, which merge back into the previous checkpoint when the checkpoint is deleted.

Scrubbing

Data Deduplication has built-in data integrity features such as checksum validation and metadata consistency checking. It also has built-in redundancy for critical metadata and for the most popular data chunks.

Container repository

Each time you make a container image, the container image and its dependencies are stored in a local repository. This allows you to reuse the image many times on the container host.

Application Compatibility Toolkit (ACT)

Enables software developers, independent software vendors, and IT professionals who work in an enterprise environment to determine whether their applications are compatible with a new version of the Windows operating system

Shared storage

External storage that is accessible to all cluster nodes.

Storage Replica

Failover clustering feature. Allow us to replicate storage from one SAN to another SAN over WAN

Arbitrated loop

Fibre Channel hosts and storage devices connect in a ring, and you do not need switches

Start order priority

Improves Hyper-V host and virtual machine performance after restarts by identifying a specific startup order for virtual machines. This reduces resource contention and allows you to start the most important virtual machines first.

Storage Quality of Service (QoS)

Improves Hyper-V host and virtual machine performance after restarts by identifying a specific startup order for virtual machines. This reduces resource contention and allows you to start the most important virtual machines first.

Hyper-V Manager improvements

Improves manageability of Hyper-V hosts by allowing for alternate credentials when connecting to a Hyper-V host. Allows you to manage some previous versions of Hyper-V. Hyper-V Manager has been updated to use HTTP-based Web Services-Management (WS-MAN) for management instead of remote procedure calls (RPC) to simplify connectivity.

Production checkpoints

Improves the functionality of checkpoints by ensuring that applications are in a consistent state when the checkpoint is created.

Virtual machine configuration file format

Increases efficiency of read and write operations to the virtual machine configuration file with a binary format instead of the previous XML format. This also prevents administrators from making manual changes to the configuration file.

Linux Secure Boot

Increases security for Linux virtual machines. Secure Boot verifies digital signatures on files during the boot process to prevent malware. This feature was already available for Windows-based virtual machines.

Docker container

Is software wrapped in a complete file system that includes everything it needs to run: code, runtime, system tools, and system libraries, or anything you can install on a server

Thin Image

It contains only the operating system and the necessary settings for a computer to be used in a network environment, and do not contain any installed applications.

Thick images

It contains the operating system and every application required by the end user

Fibre Channel over Ethernet

It is becoming more popular, because it offers outstanding performance, particularly when you use it over your inexpensive, and often preexisting, Ethernet infrastructure.

Hot add memory

It provides the ability to change the memory allocated to a virtual machine while the virtual machine is running.

Quick Migration

It requires that you install and configure the failover clustering. During the migration process, when you use this method to move virtual machines between cluster nodes, a virtual machine is placed in a saved state. This causes some downtime until it copies the memory content to another node and restores the machine from the saved state.

GPT

Max 128 partitions per drive, a partition can have up to 18 exabytes. Up to 8 Zettabytes, with 512KB of LBA

NTFS

Metadata, Auditing & Journaling, Security(ACLs & Encryption)

Server Core Benefits

More Secure.Reduced update requirements. Reduced hardware footprint. Smaller attack surface.

Migrating to Server 2016

Must migrate from x86 version of Windows server. Can use Server Migration Tools feature

What should you consider when planning an iSCSI deployment?

Network speed and performance High availability Security Vendor information Infrastructure staff Application teams

Reset-PhysicalDisk

PowerShell Command Removes a physical disk from a storage pool.

Get-VirtualDisk | Get-PhysicalDisk

Powershell Command that lists physical disks that are used for a virtual disk.

Get-StoragePool

Powershell Command that lists storage pools

Get-PhysicalDisk | Where {$_.HealthStatus -ne "Healthy"}

Powershell Command that lists unhealthy physical disks

Get-VirtualDisk

Powershell Command that lists virtual disks

Repair-VirtualDisk

Powershell Command that repairs virtual disks

Optimize-Volume

Powershell command that Optimizes a volume, performing such tasks on supported volumes and system SKUs as defragmentation, trim, slab consolidation, and storage tier processing.

iSCSI targets

Present or advertise storage, similar to controllers for hard-disk drives of locally attached storage. However, servers access this storage over a network, rather than accessing it locally.

Host resource protection

Prevents a virtual machine from monopolizing all of the resources on a Hyper-V host. This ensures that the Hyper-V host and other virtual machines have sufficient resources to function. This feature is not enabled by default.

Shielded virtual machines

Secures virtual machines from Hyper-V host administrators. The entire virtual machine is encrypted and is accessible only to the administrators of that virtual machine.

In what ways does Data Deduplication help you to achieve capacity scaling and data optimization?

Segments data into small, variable-sized chunks Identifies duplicate chunks Replaces redundant copies with a reference Compresses chunks

Integration services delivered through Windows Update

Simplifies management of virtual machines by delivering the most recent version of integration services through a standardized mechanism. Previously, integration services were distributed as an ISO image with Hyper-V and the software needed to be deployed to update it.

Automatic Activation

Suitable when deploying a large number of servers

Manual Activation

Suitable when deploying a small number of servers

MBR

Supports Max of 4 Primary partitions per drive, 2TB max size.

Storage Spaces Direct

Take multiple disk put together to combine into storage pools. Disks can come from multiple servers to combine into one array

SConfig cmd Interface

Text mode only interface. Allows and simplifies configuration of common settings on Server(Mainly core)

Asynchronous Replication

The host receives a write complete response from the primary storage after the data is written successfully on the primary storage. The data writes to the secondary storage on a different schedule, depending on the hardware or software vendor's implementation

synchronous replication

The host receives a write complete response from the primary storage after the data is written successfully to both locations, data on both storage systems are identical.

Docker Datacenter

The latest addition to the stable of Docker solutions, DDC is an integrated, end-to-end platform for deploying Containers as a Service on-premises or in a virtual private cloud. The self-service capabilities of DDC make it easy for developers to build, test, deploy, and manage agile apps.

Quorum

The number of elements that must be online for a cluster to continue to run. The quorum is determined when cluster nodes vote.

Docker Build

The process of building Docker images from a Dockerfile and any other files in the directory where the image is being built.

Failback

The process of moving cluster resources back from the second node to the first node, as a result of the first node going online again or an administrator's action. If the service or application fails over from Node1 to Node2, when Node1 is again available, the service or application will fail back to Node1.

Failover

The process of moving cluster resources from the first node to the second node, as a result of node failure or administrator's action.

Hyper-V containers

These containers expand on the isolation that Windows Server containers provide by running each container in a highly optimized virtual machine (VM)

Windows Server containers

These containers provide app isolation through process and namespace isolation technology. share the OS kernel with the container host and with all other containers that run on the host.

Kitematic

This GUI can help you to quickly build and run Docker containers and to find and pull images from the Docker Hub

integration services

This allows the guest operating system to use the virtual hardware provided by Hyper-V, also have access to services provided by Hyper-V.

Expand-DedupFile

This cmdlet expands or undeduplicate, an optimized file into its original location

Start-DedupJob

This cmdlet is used to launch ad hoc deduplication jobs, such as optimization, garbage collection, scrubbing, and unoptimization.

Measure-DedupFileMetadata

This cmdlet is used to measure potential disk space on a volume. More specifically, this cmdlet returns how much disk space you can reclaim on a volume if you delete a group of folders and subsequently run a garbage collection job.

Trace-xDscOperation

This cmdlet returns an object containing a collection of events, their event types, and the message output generated from a particular DSC operation.

Get-DedupMetadata

This cmdlet returns status information of the deduplicated data store for volumes that have data deduplication metadata, which includes the number of data chunks in a container, the number of containers in the data store, the number of data streams in a container, number of containers in the stream map store, the number of hotspots in a container, the number of hotspots in the stream map store, and the number of corruptions on the volume.

Get-DedupJob

This cmdlet returns the deduplication status and information for currently running or queued deduplication jobs.

Get-DedupVolume

This cmdlet returns the deduplication status for volumes that have data deduplication metadata. The metadata includes the deduplication rate, the number/sizes of optimized files, and deduplication settings such as minimum file age, minimum file size, excluded files/folders, compression-excluded file types, and the chunk redundancy threshold.

Update-DedupStatus

This cmdlet scans volumes to compute new Data Deduplication information for updating the metadata.

Docker commit

This commits the changes you made to the container and creates a new container image.

Replication engine

This component is the core of Hyper-V Replica. It manages the replication configuration details and handles initial replication, delta replication, failover, and test-failover operations.

Change tracking

This component tracks changes that are happening on the primary copy of the virtual machine. It is designed to make the scenario work regardless of where the virtual machine VHD file or files reside.

docker run

This creates a container by using a container image.

Filter driver

This deduplication component monitors local or remote I/O and handles the chunks of data on the file system by interacting with the various jobs. There is one filter driver for every volume.

Container host

This element consists of the physical or virtual computer that is configured with the Windows containers feature

Data Center Bridging Capabilities eXchange (DCBX) protocol

This enables devices such as the network adapters and switches to communicate and share capabilities and configuration information.

Docker Compose

This enables you to define a multiple-container app together with any dependencies so that you can run it with a single command. Lets you specify the images your app will use with any necessary volumes or networks.

Docker Machine

This enables you to provision Docker hosts by installing the Docker Engine on a computer in your datacenter or at a cloud provider.

Microsoft Windows Filtering Platform

This extension allows filtering of data that travels across a virtual switch.

Get-xDscOperation

This function lets you find the results of the DSC operations that run on one or multiple computers, and returns an object that contains the collection of events produced by each DSC operation.

Docker client

This includes a command shell that is preconfigured as a Docker command-line environment.

Docker Hub

This is a cloud-hosted service where you can register your Docker images and share them with others

Docker Engine

This is a lightweight runtime environment for building and running Docker containers.

Exporting and importing virtual machines

This is an established method of moving virtual machines without using a cluster. You export a virtual machine on one host and then, move exported files physically to another host by performing an import operation.

Cluster Network Delay

This is the frequency of the cluster heartbeats, such as the number of seconds before the next heartbeat is sent

Cluster Network Threshold

This is the number of missed heartbeats before the cluster initiates a failover procedure.

Sandbox

This layer consists of all the changes made to the container, including file system modifications, registry modifications, or software installations.

Host Clustering

This means that the guest operating system and applications that run within the VM do not have to be cluster-aware. However, the VM is still highly available.

Network module

This module provides a secure and efficient way to transfer virtual machine replicas between the primary host and the replica host. Data compression is enabled by default. HTTPS and certification-based authentication secures this communication.

Docker Swarm

This native clustering capability allows you to combine multiple Docker Engines into a single virtual Docker Engine.

Docker Registry

This open source app forms the basis for the Docker Hub and Docker Trusted Registry

Docker Trusted Registry

This private, dedicated image registry lets you store and manage images on-premises or in a virtual private cloud.

Deployment Server

This role service manages end-to-end Windows operating system deployment solutions, including a PXE component.

Transport Server

This role service provides basic network services and a PXE listener

Data Deduplication

This service identifies and removes duplications within data without compromising data integrity. It does this to achieve the ultimate goals of storing more data and using less physical disk space.

Docker stop

This stops a container. The Windows PowerShell cmdlet equivalent to this command is Stop-Container.

Differencing

This type of dynamically expanding virtual hard disk stores data that has changed when compared to a parent disk. are typically used to reduce data storage requirements.

Fixed-size

This type of virtual hard disk allocates all of the space immediately. This minimizes fragmentation, which, in turn, enhances performance.

Dynamically expanding

This type of virtual hard disk allocates space as required, which is more efficient because there is no blank space in a virtual hard disk.

Pass-through

This type of virtual hard disk provides direct access to a physical disk or Internet SCSI (iSCSI) logical unit number (LUN).

Enter-PSSession -VMName VM1

To enter a session on a virtual machine

Invoke-Command -VMName VM1 -ScriptBlock {Windows PowerShell commands}

To invoke a command on a virtual machine

Update-VMVersion "vmname"

To update the version of a single virtual machine, run the following command from an elevated Windows PowerShell command prompt

MAP

Tools analyzes the inventory of an organization's server infrastructure and creates reports that you can use for upgrade and migration plans?

LTSC Channel

Traditional deployment and versioning. Available in Server Core or Server with Desktop Experience models.

Upgrading to Server 2016

Upgrade from 2008 R2 or later. Upgrade to same or newer editions. Requires same processor architecture.

Private Virtual Switch

Used only to communicate between virtual machines on a Hyper-V host. You cannot use these switches to communicate between the virtual machines and the Hyper-V host.

Internal Virtual Switch

Used to communicate between the virtual machines on a Hyper-V host and to communicate between the virtual machines and the Hyper-V host itself.

Windows Server Migration Tools

Used to migrate server roles, features, OS settings, data, and shares

VMMQ

VMQ by allocating multiple queues per virtual machine and spreading traffic across the queues.

Guest Cluster Across Hosts

When you implement failover clustering at both the host and virtual machine levels, the resource can restart regardless of whether the node that fails is a virtual machine or a host.

Raid 5 + 0

Which RAID level should you recommend to provide high fault tolerance, capacity, and random positioning performance

RAID 1+0

Which RAID level should you recommend when performance and redundancy are critical and the cost of the required additional disks is acceptable

Update-ClusterFunctionalLevel

Windows PowerShell command that upgrades the cluster's functional level.

Docker Cloud

With this cloud-hosted service, you can directly deploy and manage your Docker apps

Virtual Machine and Storage Migration

With this method, you move a powered-on virtual machine from one location to another or from one host to another by using the Move Virtual Machine Wizard in Hyper-V Manager.

switch-embedded teaming (SET)

You can combine network adapters into a team by creating a virtual switch with up to 8 network adapters. All of the network adapters in a team must be identical with the same firmware version and driver.

Set-SMBbandwidthlimit

You can configure bandwidth limits for live migration to optimize network bandwidth during the live migration process by using the Windows PowerShell cmdlet

Universal Control Panel

You can use this to manage Docker apps regardless of whether they are running on-premises or within a virtual private cloud.

External Virtual Switch

You use this type of switch to map a network to a specific network adapter or network adapter team in the Hyper-V host. This provides virtual machines with access to a network that the host is connected to.

point-to-point deployment

a Fibre Channel host connects directly to a storage device, and you do not need switches.

Dynamic Disks

a disk that you initialize for dynamic storage, and that contains dynamic volumes. Dynamic disks are used for configuring fault tolerant storage.

Failover Cluster

a group of independent computers that work together to increase the availability of applications and services.

SAN

a high speed network that connects computer systems or host servers to high-performance storage subsystems

Volume

a storage unit that is made from free space on one or more disks. You can format the volume with a file system and then assign it a drive letter, or configure it with a mount point.

Hot Data

commonly referred to as working set, is files that are currently being worked on; this part of the data set is highly active and changes over time.

default host

configure NLB to direct traffic to a specific host

Boot Volumes

contains the Windows operating system files that are in the %Systemroot% and %Systemroot%\System32 folders.

iSCSI initiator

acts as a local disk controller for the remote disks

Dynamic memory

allows you to configure Hyper-V so that a virtual machine is allocated as much memory as it needs.

Resource metering

allows you to track the resource utilization of virtual machines hosted on Windows Server 2016 computers that have the Hyper-V role installed.

Microservices

are an approach to app development where every part of an app deploys as a fully self-contained component

Containers

are an isolated operating environment that you can use to provide a controlled and portable space for an app.

SSD

are data storage devices that use solid-state memory to store data rather than using the spinning disks and movable read/write heads that are used in other disks.

Virtual hard disks

are files that represent a traditional hard disk drive.

iSCSI qualified name (IQN).

are unique identifiers that iSCSI uses to address initiators and targets on an iSCSI network.

Storage spaces

are virtual disks created from free space in a storage pool

Drainstop action

blocks all new connections without terminating existing sessions. After all current sessions end, the NLB service stops.

SMB

client-server file-sharing protocol is found on multiple platforms and includes an open‑source version

Nested virtualization

converts a Hyper-V guest virtual machine to a Hyper-V host so that it can host other guest virtual machines.

Block-level storage

delivered to servers via a SAN, most often by using one of the SAN communication protocols, such as iSCSI, Fibre Channel, or Fibre Channel over Ethernet. Storage administrators create storage volumes out of chunks of block-level storage

SAS

depends on a point-to-point serial protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set.

High availability

describes components and technologies that need to be redundant so that the solution continues to work in a case of failure of any of the solution's components.

Business impact analysis

determines an organization's critical business processes and the potential damage or loss that can result from their disruption or failure.

DAS

disks that are physically located inside the server or that connect directly with an external array, or disks that connect to the server with a universal serial bus (USB) cable or an alternative connector.

NLB

distributes network traffic across a set of servers, balancing the workload each server must handle. It is scalable because it enables you to add additional servers (also called nodes or hosts)

PowerShell Direct

does not require a network connection to do Windows PowerShell remoting from the Hyper-V host on which the virtual machine is running.

Shared Nothing Live Migration

does not require failover clustering. In addition, hosts do not have to share any storage for this type of migration to be performed.

Failover Clustering

enables a group of independent servers to work together to increase the availability of applications and services. If a server cluster, or node, fails, then another node begins to provide services.

Host clustering

enables you to configure a failover cluster by using the Hyper-V host servers. You implement failover protection at the host-server level.

Live Migration

enables you to migrate a virtual machine from one host to another without experiencing downtime.

NFS

file-system protocol is based on open standards and allows access to a file system over a network

iSNS server

has a database with a collection of information about storage devices and where that storage has been allocated.

QoS

helps to ensure that all virtual machines are able to obtain a minimum level of network capacity when required.

Windows Assessment Toolkit

helps you assess a running operating system, determine its status, review results in a report, diagnose problems or issues, and helps you correct the problems or issues.

Docker rm

his removes a container. The Windows PowerShell cmdlet equivalent to this command is Remove-Container.

Guest failover

is configured similarly to a physical-server failover clustering, except that the cluster nodes are virtual machines. In this scenario, you create two or more virtual machines and enable failover clustering within the guest operating system

Cold Data

is files that are accessed infrequently, and have a longer life span.

Storage layout

is one of the characteristics that defines the number of disks from the storage pool that are allocated.

Recovery time objective (RTO)

is the amount of time that it takes to recover from failure.

Container OS image

is the first layer in potentially multiple image layers that make up a container

Windows PE

is the initial operating system that you use during a Windows operating system deployment

Docker

is the management software for containers

Scaling

is the process of increasing the capacity of an NLB cluster

Convergence

is the process where a new list of cluster members is created and the cluster members record the current configuration of the cluster

Garbage Collection

jobs to process deleted or modified data on the volume so that any data chunks no longer referenced are cleaned up

Retention objectives

measure the length of time to store backed-up data

Switched fabric.

most common Fibre Channel. All Fibre Channel hosts connect to Fibre Channel switches, and the Fibre Channel switches connect to the backend storage.

DCB

provides a standard by which you can combine these networks into a single physical infrastructure that supports Ethernet, Fibre Channel, Infiniband networks and iSCSI

Scale-Out File Server

provides continuously available storage for file-based server applications

iSNS

provides intelligent storage discovery and management services comparable to those found in Fibre Channel networks

Relaxed monitoring

provides more tolerance in network-failure detection, which means that in some cases of very short network outage, a cluster's nodes do not initiate a failover procedure

Aggressive monitoring

provides the fastest detection of server failure and also provides fast recovery, which means this type of monitoring provides the highest level of availability.

Continuous availability

results from technologies and procedures that ensure that an IT solution continues to work in a case of failure scenarios and planned maintenance downtime.

Windows PowerShell DSC

set of Windows PowerShell extensions, cmdlets, and resources that supports managing remote computers in a scalable and standardized manner by pushing or pulling declarative configurations?

Recovery point objective (RPO)

sets a limit on how much data you lose due to failure.

SAN

storage method reads and writes at block levels and provides a high level of redundancy

NAS

storage that connects to a dedicated storage device and is then accessed over the network.

Stop action

terminates all existing connections to the cluster node and stops the NLB service

Enhanced Integrated Drive Electronics (EIDE).

there is a 128 GB limitation on storag. Speed is limited to a maximum of 133 megabytes (MB) per second (mbps). Are seldomly used today.

Get-DedupStatus

this cmdlet returns the deduplication status for volumes which have data deduplication metadata, which includes the deduplication rate, the number/sizes of optimized files, the last run-time of the deduplication jobs, and the amount of space saved on the volume.

Smart Paging

uses disk paging for additional temporary memory when virtual machines are starting and need more memory than the host can allocate

virtual machine queue (VMQ)

uses hardware packet filtering to deliver network traffic directly to a virtual machine

Validation Wizard

verifies whether every component of the failover cluster node meets the hardware, network, infrastructure, and software requirements

LUNs

virtual storage areas.

Authoritative restore

when you must roll back the cluster configuration. For example, if an administrator accidentally removed clustered resources or modified other cluster settings, and you need to revert the cluster to a previous point in time

dynamic quorum

which refers to the dynamic adjustment of quorum votes on the basis of how many servers are online

Hot add network adapter

you can add or remove network adapters from a running virtual machine.

Guest clustering

you create two or more VMs, install, and implement failover clustering within the guest operating systems


Related study sets

Using Word to Apply Letter Formats

View Set

Sets, Subsets, Power Sets, Cardinality

View Set

Business Data Analysis: Chapter 2

View Set

Chapter 5 Describing Data with Z Scores

View Set