What are DFS Namespace shared folders referred to in relation to the virtual folders? |
targets |
What is the primary difference between domain-based namespace and stand-alone namespace? |
where the namespaces are stored |
The default namespace mode is Windows Server 2008, which supports up to 50,000 folders. How many folders does using non-Windows Server 2008 provide? |
5,000 |
What term is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or a DFS folder with targets"? |
referral |
How do you secure DFS Namespaces? |
NTFS and shared folder permissions |
What is the primary disadvantage of DFS Replication? |
additional storage space required |
DFS Replication does not replace the need for backups because of what feature of replication? |
It replicates deleted, changed, and corrupted files. |
By default, replication groups use what type of topology to replicate to all members of the group? |
full mesh |
Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration? |
hub/spoke |
What compression algorithm does Microsoft use to limit the amount of bandwidth used in DFS Replication? |
remote differential compression (RDC) |
What type of resolution model does DFS Replication use to resolve simultaneous-write conflicts? |
last-writer wins |
What is the default quota size of the Conflict and Deleted folder? |
660 MB |
What type of special cache folder does each replication folder use to hold files ready to be replicated? |
staging folder |
If you want to save on CPU and disk I/O but consume more network bandwidth for replication, which DFS feature can you disable? |
remote differential compression (RDC) |
What can you do to change bidirectional replication into unidirectional? (Choose two.) |
Change share permissions. |
When DFS Replication and DFS Namespace are combined into a single service offering, the pair creates what type of file sharing service? (Choose the BEST choice according to Microsoft.) |
fault tolerant |
When should you increase the default quota size for the staging folder? (Choose the BEST option according to Microsoft.) |
when you have multiple large files that change frequently |
If one of the replicated folders isn’t available, what happens when a user requests a file? (Choose the BEST choice according to Microsoft.) |
The request is rerouted to another replicated folder. |
Order the following general steps for creating a fault-tolerant DFS service on your network. |
Create the same folder on multiple servers. Share the folders. Configure DFS Replication between the folders on the various servers. Create a DFS Namespace that includes targets of all target folders for a replication group. |
Order the following steps to install DFS Replication. |
Choose Server Manager > Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool. Choose File and Storage Services > File and iSCSI services > DFS Replication. Add Features. |
Order the following steps to set the target priority on a root target for a domain-based namespace. |
Choose Server Manager > Tools > DFS Management. Expand the Namespaces folder. Select the desired namespace. Select the Namespace Servers tab. Open Properties for the root target to change. Select the Advanced tab and select Override referral ordering. Select the priority. |
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "Last among all targets" option specify? |
Users should never be referred to this target unless all other targets are unavailable. |
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among targets of equal cost" option specify? |
Users should be referred to this target before other targets of equal cost (which usually means other targets in the same site). |
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "Last among targets of equal cost" option specify? |
Users should never be referred to this target if other targets of equal cost are available (which usually means other targets in the same site). |
When setting target priority on a root target for a domain-based namespace, you can override referral ordering and select the priority you want to use. What does the "First among all targets" option specify? |
Users should always be referred to this target if the target is available. |
What type of service is the Windows File Server Resource Manager? |
role |
What effect does using quotas in File Server Resource Manager have? |
It limits the number of gigabytes allocated to a volume or folder. |
Placing a quota limit on a folder applies that limit to what part of the folder? |
the entire folder and its subtree |
When you create quotas, you are recommended to use what built-in feature to assist you? |
quota template |
What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers? |
File Screening |
Which screening technique prevents a user from saving defined unauthorized files? |
Active |
Some exemptions might be required for certain groups to store otherwise restricted file types. What type of exemption can you set up on folders? |
file screen exception |
What feature can you use to simplify the management of file screens? |
templates |
What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files? |
Storage Reports |
What does the acronym SMTP stand for? |
Simple Mail Transfer Protocol |
What group must you be a member of to enable SMTP? |
Administrators |
By default, where are storage reports saved? |
C:\StorageReports\Scheduled |
You can generate several different reports from FSRM. One of them gives you a list of Least Recently Accessed Files. What would be the purpose of that report? |
To allow you to archive unused files |
When you change a file template and save the changes, you have the option to do which one of the following? |
apply the template to all derived file screens |
What is the purpose of setting soft quotas? |
to notify users that they have reached the quota limit |
If you were asked to set up a shared file area for users that prevented them from saving video files or images of any kind, what would you set up on that shared folder? |
Active file screen with included and excluded file groups |
What is the purpose of setting up e-mail notifications for users who violate storage quotas? |
so that administrators can proactively assist users in resolving the problem |
When storage space is at a premium, what should you do to ensure that everyone has enough space? |
Set up hard quota limits with e-mail notification. |
Order the following steps required to install FSRM. |
Choose Server Manager >Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool. Open File and Storage Services and expand File and iSCSI Services. Select File Server Resource Manager. |
Order the following steps required to create a quota template. |
Choose Server Manager > File Server Resource Manager. Under Quota Management, right-click Quota Templates and select Create Quota Template. Select a template from the Copy properties from quota template drop-down list. Name the template. Enter a Description of the template. Enter a space limitation in KB, MB, GB, or TB. Add and configure e-mail notification. To log an event, select the Event Log tab, select the Send warning to event log check box, and then edit the default log entry. |
Order the following steps to create a quota from a quota template. |
Choose Server Manager > Tools > File Server Resource Manager. Under the Quota Management node, click the Quota Templates node. Right-click the template on which you will base your quota and click Create Quota from Template. Type the volume or folder that the quota applies to in the Quota path text box. Select the Create quota on path option and click Create. |
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Duplicate Files storage report show? |
a list of files that are the same size and have the same last modified date |
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Least Recently Accessed Files storage report show? |
a list of files that have not been accessed for a specified number of days |
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Files by File Group storage report show? |
a list of files sorted by selected file groups defined with FSRM |
You can use FSRM to create several different types of storage reports that show the state of server volumes and anyone who exceeds the quotas or uses files that aren’t allowed. What does a Quota Usage storage report show? |
a list of quotas that exceed a specified percentage of the storage limit |
Encryption is the process of converting data into what kind of format? |
unreadable |
After a file has been encrypted, it is stored in what format? |
encrypted |
An encrypted file can be converted back to its original format by a process known as what? |
decryption |
Single-key encryption is also known as what kind of encryption? |
symmetric |
Public-key cryptography uses how many keys? |
two |
What’s the status of your data if someone has your public key? |
safe |
What is one purpose of using hash function encryption? |
to store passwords in a non-readable format |
What key length is considered to be minimally strong for encryption algorithms? |
80 |
What happens to files and subfolders within an EFS encrypted folder? |
They’re encrypted with the parent folder. |
You can encrypt individual files, but Microsoft recommends encrypting at what level? |
folder |
EFS encryption is what type of feature that can be enabled or disabled at will, similar in effect to read-only, compression, or hidden? |
attribute |
What happens if you move unencrypted files into an encrypted folder? |
The new files become encrypted. |
If you’re a command-line user, what command will encrypt files and folders? |
cipher.exe |
What built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption? |
Trusted Platform Module |
On what type of computer is BitLocker not commonly used? |
servers |
From a security standpoint, which BitLocker operational mode is most secure? Choose the BEST answer according to Microsoft. |
PM + startup key |
Where is the most secure location to store secure key recovery information? Choose the BEST answer according to Microsoft. |
in Active Directory |
Encryption does not protect a file or folder from deletion. To protect a file or folder from deletion, what technology should you use? Choose the BEST answer according to Microsoft. |
NTFS permissions |
Order the following steps to install BitLocker Drive Encryption. |
Choose Server Manager > Manage > Add Roles and Features. Select Role-based or feature-based installation. Select a server from the server pool and click the name of the server to install BitLocker to. On the Select features page, select BitLocker Drive Encryption. Reboot the system. |
Order the following steps to turn on BitLocker Drive Encryption. |
Choose Control Panel > System and Security > BitLocker Drive Encryption. Click Turn on BitLocker for the volume that you want to encrypt. On the Choose how you want to unlock this drive page, select Use a password to unlock the drive. Type a password in the Enter your password and Reenter your password text boxes. On the How do you want to back up your recovery key? page, click the Save to a file option. Save the BitLocker recovery key. On the Choose how much of your drive to encrypt page, select Encrypt used disk space only or Encrypt entire drive. On the Are you ready to encrypt this drive? page, click Start encrypting. |
Order the following steps to back up an EFS Certificate. |
At the command prompt, type certmgr.msc. Open Personal and then select Certificates. In the main pane, right-click the certificate that lists Encrypting File System under Intended Purposes, select All Tasks, and then click Export. On the Export Private Key page, click Yes, export the private key. On the Security page, select the Password checkbox and type the password in the Password and Confirm password text boxes. On the File to Export page, type a name for the file and the location or click Browse, navigate to a location, type a filename, and then click Save. |
BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN BitLocker mode with its correct description. |
The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a PIN before the system can unlock the BitLocker volume and complete the system boot sequence. |
BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup PIN + startup key BitLocker mode with its correct description. |
The system stores the BitLocker volume encryption key on the TPM chip, but you must supply a personal identification number (PIN) and insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence. |
BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM only BitLocker mode with its correct description. |
The system stores the BitLocker volume encryption key on the TPM chip and accesses it automatically when the chip has determined that the boot environment is unmodified. This unlocks the protected volume and the computer continues to boot. No administrative interaction is required during the system boot sequence. |
BitLocker has multiple operational modes for OS drives that define the steps involved in the boot process. Match the TPM + startup key BitLocker mode with its correct description. |
The system stores the BitLocker volume encryption key on the TPM chip, but you must insert a USB flash drive containing a startup key before the system can unlock the BitLocker volume and complete the system boot sequence. |
Server 4-6
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price