Server 4-6

Your page rank:

Total word count: 2414
Pages: 9

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

What are DFS Namespace shared folders referred to in relation to the virtual folders?

targets

What is the primary difference between domain-based namespace and stand-alone namespace?

where the namespaces are stored

The default namespace mode is Windows Server 2008, which supports up to 50,000 folders. How many folders does using non-Windows Server 2008 provide?

5,000

What term is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or a DFS folder with targets"?

referral

How do you secure DFS Namespaces?

NTFS and shared folder permissions

What is the primary disadvantage of DFS Replication?

additional storage space required

DFS Replication does not replace the need for backups because of what feature of replication?

It replicates deleted, changed, and corrupted files.

By default, replication groups use what type of topology to replicate to all members of the group?

full mesh

Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration?

hub/spoke

What compression algorithm does Microsoft use to limit the amount of bandwidth used in DFS Replication?

remote differential compression (RDC)

What type of resolution model does DFS Replication use to resolve simultaneous-write conflicts?

last-writer wins

What is the default quota size of the Conflict and Deleted folder?

660 MB

What type of special cache folder does each replication folder use to hold files ready to be replicated?

staging folder

If you want to save on CPU and disk I/O but consume more network bandwidth for replication, which DFS feature can you disable?

remote differential compression (RDC)

What can you do to change bidirectional replication into unidirectional? (Choose two.)

Change share permissions.

When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates what type of file sharing service? (Choose the BEST choice according to Microsoft.)

fault tolerant

When should you increase the default quota size for the staging folder? (Choose the BEST option according to Microsoft.)

when you have multiple large files that change frequently

If one of the replicated folders isn’t available, what happens when a user requests a file? (Choose the BEST choice according to Microsoft.)

The request is rerouted to another replicated folder.

Order the following general steps for creating a fault-tolerant DFS service on your network.

Create the same folder on multiple servers. Share the folders. Configure DFS Replication between the folders on the various servers. Create a DFS Namespace that includes targets of all target folders for a replication group.

Order the following steps to install DFS Replication.

Choose Server Manager > Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool. Choose File and Storage Services > File and iSCSI services > DFS Replication. Add Features.

Order the following steps to set the target priority on a root target for a domain-based namespace.

Choose Server Manager > Tools > DFS Management. Expand the Namespaces folder. Select the desired namespace. Select the Namespace Servers tab. Open Properties for the root target to change. Select the Advanced tab and select Override referral ordering. Select the priority.

When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "Last among all targets" option specify?

Users should never be referred to this target unless all other targets are unavailable.

When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among targets of equal cost" option specify?

Users should be referred to this target before other targets of equal cost (which usually means other targets in the same site).

When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "Last among targets of equal cost" option specify?

Users should never be referred to this target if other targets of equal cost are available (which usually means other targets in the same site).

When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among all targets" option specify?

Users should always be referred to this target if the target is available.

What type of service is the Windows File Server Resource Manager?

role

What effect does using quotas in File Server Resource Manager have?

It limits the number of gigabytes allocated to a volume or folder.

Placing a quota limit on a folder applies that limit to what part of the folder?

the entire folder and its subtree

When you create quotas, you are recommended to use what built-in feature to assist you?

quota template

What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?

File Screening

Which screening technique prevents a user from saving defined unauthorized files?

Active

Some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set up on folders?

file screen exception

What feature can you use to simplify the management of file screens?

templates

What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files?

Storage Reports

What does the acronym SMTP stand for?

Simple Mail Transfer Protocol

What group must you be a member of to enable SMTP?

Administrators

By default, where are storage reports saved?

C:\StorageReports\Scheduled

You can generate several different reports from FSRM. One of them gives you a list of Least Recently Accessed Files. What would be the purpose of that report?

To allow you to archive unused files

When you change a file template and save the changes, you have the option to do which one of the following?

apply the template to all derived file screens

What is the purpose of setting soft quotas?

to notify users that they have reached the quota limit

If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind, what would you set up on that shared folder?

Active file screen with included and excluded file groups

What is the purpose of setting up e-mail notifications for users who violate storage quotas?

so that administrators can proactively assist users in resolving the problem

When storage space is at a premium, what should you do to ensure that everyone has enough space?

Set up hard quota limits with e-mail notification.

Order the following steps required to install FSRM.

Choose Server Manager >Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool. Open File and Storage Services and expand File and iSCSI Services. Select File Server Resource Manager.

Order the following steps required to create a quota template.

Choose Server Manager > File Server Resource Manager. Under Quota Management, right-click Quota Templates and select Create Quota Template. Select a template from the Copy properties from quota template drop-down list. Name the template. Enter a Description of the template. Enter a space limitation in KB, MB, GB, or TB. Add and configure e-mail notification. To log an event, select the Event Log tab, select the Send warning to event log check box, and then edit the default log entry.

Order the following steps to create a quota from a quota template.

Choose Server Manager > Tools > File Server Resource Manager. Under the Quota Management node, click the Quota Templates node. Right-click the template on which you will base your quota and click Create Quota from Template. Type the volume or folder that the quota applies to in the Quota path text box. Select the Create quota on path option and click Create.

You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Duplicate Files storage report show?

a list of files that are the same size and have the same last modified date

You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Least Recently Accessed Files storage report show?

a list of files that have not been accessed for a specified number of days

You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Files by File Group storage report show?

a list of files sorted by selected file groups defined with FSRM

You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Quota Usage storage report show?

a list of quotas that exceed a specified percentage of the storage limit

Encryption is the process of converting data into what kind of format?

unreadable

After a file has been encrypted, it is stored in what format?

encrypted

An encrypted file can be converted back to its original format by a process known as what?

decryption

Single-key encryption is also known as what kind of encryption?

symmetric

Public-key cryptography uses how many keys?

two

What’s the status of your data if someone has your public key?

safe

What is one purpose of using hash function encryption?

to store passwords in a non-readable format

What key length is considered to be minimally strong for encryption algorithms?

80

What happens to files and subfolders within an EFS encrypted folder?

They’re encrypted with the parent folder.

You can encrypt individual files, but Microsoft recommends encrypting at what level?

folder

EFS encryption is what type of feature that can be enabled or disabled at will, similar in effect to read-only, compression, or hidden?

attribute

What happens if you move unencrypted files into an encrypted folder?

The new files become encrypted.

If you’re a command-line user, what command will encrypt files and folders?

cipher.exe

What built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption?

Trusted Platform Module

On what type of computer is BitLocker not commonly used?

servers

From a security standpoint, which BitLocker operational mode is most secure? Choose the BEST answer according to Microsoft.

PM + startup key

Where is the most secure location to store secure key recovery information? Choose the BEST answer according to Microsoft.

in Active Directory

Encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use? Choose the BEST answer according to Microsoft.

NTFS permissions

Order the following steps to install BitLocker Drive Encryption.

Choose Server Manager > Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool and click the name of the server to install BitLocker to. On the Select features page, select BitLocker Drive Encryption. Reboot the system.

Order the following steps to turn on BitLocker Drive Encryption.

Choose Control Panel > System and Security > BitLocker Drive Encryption. Click Turn on BitLocker for the volume that you want to encrypt. On the Choose how you want to unlock this drive page, select Use a password to unlock the drive. Type a password in the Enter your password and Reenter your password text boxes. On the How do you want to back up your recovery key? page, click the Save to a file option. Save the BitLocker recovery key. On the Choose how much of your drive to encrypt page, select Encrypt used disk space only or Encrypt entire drive. On the Are you ready to encrypt this drive? page, click Start encrypting.

Order the following steps to back up an EFS Certificate.

At the command prompt, type certmgr.msc. Open Personal and then select Certificates. In the main pane, right-click the certificate that lists Encrypting File System under Intended Purposes, select All Tasks, and then click Export. On the Export Private Key page, click Yes, export the private key. On the Security page, select the Password checkbox and type the password in the Password and Confirm password text boxes. On the File to Export page, type a name for the file and the location or click Browse, navigate to a location, type a filename, and then click Save.

BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN BitLocker mode with its correct description.

The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence.

BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN + startup key BitLocker mode with its correct description.

The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM only BitLocker mode with its correct description.

The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence.

BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup key BitLocker mode with its correct description.

The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending