Term
3.1 When would you install the Services for Network File System (NFS) role service? When is the NFS protocol used instead of the SMB protocol? |
|
Definition
o To provide a solution for organizations who have a mixed Unix and Windows environment. NFS protocol is used to provide access to files used by Unix computers |
|
|
Term
3.1 What share settings can only be configured through the Share and Storage Management console? |
|
Definition
|
|
Term
3.1 How does access-based enumeration work with NTFS permissions to restrict access to files and folders in shared folders? |
|
Definition
The list of files is filtered based on NTFS permissions, not the hidden file attribute |
|
|
Term
3.1 What are the differences and similarities between NTFS permissions and share permissions? |
|
Definition
Share permission are in effect only when files are being access through network share. NTFS permissions restrict access to both local and netowkr users. BOTH must be configured to allow access through the share |
|
|
Term
3.1 What strategy can you use to combine NTFS and share permissions? |
|
Definition
Assign full control share permissions to everyone. Use NTFS permissions to control access. Add only necessary groups to NTFS permissions and assign only the necessary permissions |
|
|
Term
3.2 What are the differences between Storage Area Network (SAN) and Network Attached Storage (NAS)? |
|
Definition
SAN connects mutltiple servers with multiple external storage devices through dedicated network. NAS external storage devices are connected to the network sharing the network with servers, workstations, etc. |
|
|
Term
3.2 What methods are used to create the SAN fabric? |
|
Definition
Fibre Channel (FC) and iSCSI |
|
|
Term
3.2 What advantages does iSCSI have over Fibre Channel? What disadvantages does it have? |
|
Definition
Avoids cost of FC hardware & can create a fast and powerful SAN using off the self hardware.
IP implemented SANs don't run as fast as FC network |
|
|
Term
3.2 Which types of disk configurations provide fault tolerance? |
|
Definition
Mirrored (RAID 1), Striped With Parity (RAID 5) |
|
|
Term
3.2 What is the minimum number of disks required for a RAID-1 (mirrored) configuration? RAID-5? |
|
Definition
RAID-1 requires 2, RAID-5 requires 3 |
|
|
Term
3.2 How much overhead is there with a RAID-5 implementation with 4 disks? Which disk configuration methods have no overhead? |
|
Definition
4 disks have 24% overhead, Striped RAID-0 and Spanned have no overhead |
|
|
Term
3.2 What is the advantage of using Multipath I/O (MPIO)? What hardware is required for this type of configuration? |
|
Definition
Increased performance for data access & ensures data is accessible if a single componenet of SAN fails.
HBA's, Switches & Cables Required |
|
|
Term
3.2 What is the difference between round robin load balancing and weighted paths load balancing? |
|
Definition
Round Robin - all available paths are going to be used. If path fails the load is redistributed among the remaining paths. Weighted paths -each path is assigned a weight. Path with the least weight is chosen for I/O |
|
|
Term
3.2 What is VHD native boot? What advantages does it provide? |
|
Definition
VHD can be used for the running operating sytem on a physical machine without the need of a parent operating system. Advantage- allows you to have full access to all devices and file system volumes on the physical computer including any volumes inside VHD |
|
|
Term
3.3 What is the difference between the namespace root and a folder within DFS? |
|
Definition
Namespace root is the starting point of a namespace (top level shared folder). Folders are used beneath the namespace root to organize the DFS structure to provide links to shared folders hosted on other servers |
|
|
Term
3.3 If you have multiple namespace servers, which namespace type should you implement? |
|
Definition
|
|
Term
3.3 Which namespace type and mode would you choose to support access-based enumeration? |
|
Definition
|
|
Term
3.3 If you have a single namespace server and that server fails, what happens to client access for folders within the DFS structure? Why? |
|
Definition
|
|
Term
3.3 Which replication topology requires each server to replicate with each other? |
|
Definition
|
|
Term
3.3 When can you add a failover cluster to a DFS replication group? |
|
Definition
When the DFS replication, DFS management console and the failover cluster are all running on Windows Server 2008 |
|
|
Term
3.3 How can you prevent users from adding or changing files in a replicated folder? |
|
Definition
Make the replicated folder read only |
|
|
Term
3.4 Under which circumstances should you enable distributed cache mode rather than hosted cache mode? |
|
Definition
Distributed cache is enabled when you cannot have a branch cache enabled server locally in each branch office |
|
|
Term
3.4 How does BranchCache treat traffic while in transit? |
|
Definition
Protects transmitted data using HTTPS and IPSEC encryption |
|
|
Term
3.4 Why does a hosted cache server need an enrolled server certificate from a trusted CA? |
|
Definition
If client computers do not trust the CA that issued the certificate to the hosted cache server, authentication fails and the client computers will not be able to obtain content from the hosted cache server. |
|
|
Term
3.5 How does a soft quota differ from a hard quota? |
|
Definition
Soft quota -tracks disk space used by the files but does not prevent the limit from being exceeded. Hard quota -sets a limit on the amount of space that the volume or folder contents can use |
|
|
Term
3.5 How do quota templates facilitate quota management? |
|
Definition
If we need to maintain one quota across multiple locations we can make changes to templates instead of each quota independently |
|
|
Term
3.5 What is the difference between a quota and a file screen? |
|
Definition
Quota allows you to set hard or soft space limits on a volume or folder. File screen prevents specific types of files from being saved in the specific volume or folder |
|
|
Term
3.5 How is an active file screen more restrictive than a passive file screen? |
|
Definition
Active file screen prevents files of the identified types from being saved in the file system path while passive file screen monitors file types but does not prevent saving files |
|
|
Term
3.5 What are the primary differences between disk quotas and quotas implemented through FSRM? |
|
Definition
Disk Quota is enabled at volume level, enforced on per user basis and is calculated according to logical file size, not actual disk space. Folder & Volume quota is enabled at volume or folder levels, enforced ona per volume or per folder basis, and is calculated according to actual disk space occupied by files |
|
|
Term
3.5 What can you accomplish with the file expiration task? |
|
Definition
You can automatically move all files that match certain criteria to a specified expiration directory |
|
|
Term
3.6 How does the offline files feature ease file management for mobile users? |
|
Definition
Gives them access to offline versions of the files/folders as though they were connected to the network |
|
|
Term
3.6 What happens to NTFS permissions on cached copies of files? |
|
Definition
NTFS permissions also apply to cache copies of files even if offline file cache is not an NTFS folder |
|
|
Term
3.6 How does synchronization affect files? |
|
Definition
controls when the cached files and original files will be synchronized |
|
|
Term
3.6 What steps can you take to reconcile synchronization conflicts? |
|
Definition
choose to keep the version being uploaded from the client, choose to keep the version already on the server, keep both versions and merge the changes manually |
|
|
Term
3.6 Which types of content are indexed by Windows Search Service? |
|
Definition
Documents, photos, media files, email messages, contacts, calendars |
|
|
Term
3.6 On which volumes and folders should Windows Search Service be enabled? |
|
Definition
Intended for desktop, or small file server searches |
|
|
Term
3.6 What will you need to do if you want to use both the Windows Search Service and the Indexing Service? |
|
Definition
You cannot install the Windows Search Service and Indexing Service at the same time |
|
|
Term
3.7 Which permissions allow you to encrypt a file or folder? |
|
Definition
|
|
Term
3.7 Who can copy or move encrypted files or folders? |
|
Definition
|
|
Term
3.7 What is the result of moving an encrypted file to a non-NTFS partition? |
|
Definition
|
|
Term
3.7 Which encryption feature will encrypt system files? |
|
Definition
|
|
Term
3.7 What functions are performed by the Trusted Platform Module (TPM)? What BitLocker features are only available when using a TPM? |
|
Definition
TPM ensures system integrity by examining start up components, generating and saving a system identifier, generating a new system identifier then comparing both to see if they match or not. TPM is required to use the system integrity checks available through BitLocker |
|
|
Term
3.7 When should you disable Bitlocker versus decrypt volumes using BitLocker? |
|
Definition
Disable BitLocker when you want to temporarily disable BitLocker for maintenance. Decrypt when you want to permanentely remove BitLocker |
|
|
Term
3.7 How do you enter the recovery key if the computer enters recovery mode? |
|
Definition
Key must be placed on a USB drive and inserted in the system when prompted |
|
|
Term
3.8 When would you add the LPD Service? When would you need the LPR Port Monitor feature? |
|
Definition
To enable UNIX computers or other computers that user LPR service to print to shared printers configured on the server |
|
|
Term
3.8 What is the difference between the Manage Documents permission and the Print permission? |
|
Definition
Manage documents permission allow users to manage all documents in the print queue. Print permissions allows user to send print jobs and manage their own documents in the queue |
|
|
Term
3.8 Under which circumstances would you configure a printer to use multiple print devices? When would you configure multiple printers for a single print device? |
|
Definition
If one device is out of order, the users print job will be automatically directed to the other print device. When planning priority for printers |
|
|
Term
3.8 What is the difference between listing a printer in Active Directory and deploying a printer with Group Policy? |
|
Definition
Listing a printer in Active Directory does not automatically add a printer to client computer while deploying the printer to user adds the printer for the user regardless of which computer they log on to |
|
|
Term
3.8 How do client computers get printer drivers? |
|
Definition
|
|
Term
3.8 When would you choose to isolate a print driver? |
|
Definition
To identify printer drivers that are causing spooler failures |
|
|
Term
3.8 What is the advantage of location-aware printing? |
|
Definition
Automatically adjusts according to the location and selects the correct default printer for that network |
|
|
Term
3.5 How can you automatically assign classification information to files? |
|
Definition
FSRM file classification feature automatically assigns classification information to files |
|
|