Windows Server 2019 Module 4 whole set

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/257

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

258 Terms

1
New cards

Internet Small Computer Systems Interface (iSCSI) is

A TCP/IP based storage networking standard for connecting data storage services. It allows for block-level access to storage by transporting iSCSI commands over a network

2
New cards

iSCSI is an inexpensive and simple way to configure a connection to a

remote disk

3
New cards

iSCSI relies on harrdware such as

Host Bus Adapter(HBA) or network switches

4
New cards

iSCSI can be used to transmit data over

LANs

WANs

an Intranet

the Internet

5
New cards

iSCSI typically uses which port

TCP 3260

6
New cards

iSCSI creates what type of network

Storage Area Network (SAN)

7
New cards

Best practice is to run iSCSI on its own

Physical and Logical Network

8
New cards

What is the most popular storage networking architecture used by enterprises

Storage Area Networks (SANs)

9
New cards

What should be the minimum speed of your network for iSCSI

1 Gbps

10
New cards

What does an iSCSI target do

presents or advertises itself over the network

11
New cards

iSCSI can be in the form of

software or hardware

12
New cards

Another name for an iSCSI Initiator is

Client

13
New cards

iSCSI Qualified Name (IQN) are

unique Identifiers that iSCSI uses to address initiator and targets on an iSCSI network

14
New cards

All windows operating systems include

the iSCSI initiator 4

15
New cards

What are the two main components of iSCSI

iSCSI Target Initiator and iSCSI Target Server

16
New cards

The iSCSI Target Server role service provides a

software-based and hardware independent iSCSI disk subsystem

17
New cards

iSCSI Target server can be used to create both

iSCSI targets and iSCSI virtual disk

18
New cards

What is Network or Diskless Boot

A way to rapidly deploy diskless servers. This can save up to 90 percent of the storage space that you use for OS by using differencing virtual hard disks. This method is ideal for identical OS images such as ones running on VMs or high-performance computing (HPC) clusters

19
New cards

Server application storage

Can be used for application that require block storage

20
New cards

Heterogeneous storage

The ability to share storage with devices not running Windows Operating Systems

21
New cards

Lab environments

Allows you to use network-accessible block storage to experiment and simulate uses before deploying them onto a SAN

22
New cards

CHAP stands for

Challenge Handshake Authentication Protocol

23
New cards

What does Chap do

Can be used to allow the initiator to authenticate with the iSCSI target

24
New cards

Query initiator computer for ID

This enables you to select an available Initiator ID from the list of cached IDs on the Target server

25
New cards

Virtual hard-disk support

The ability to create iSCSI virtual disks

26
New cards

What does iSNS do

facilitates the integration of IP networks and and manages iSCSI devices

27
New cards

The database provides iSCSI initiators with

iSCSI target discovery functionality

28
New cards

How does the database update

Registration Period and Entity Status Inquiry features of iSNS.

29
New cards

Registration Period allows iSNS to

delete stale entries from the database

30
New cards

Entity Status Inquiry is similar to

ping and allows iSNS to determine weather register nodes are still present and allows it to delete entries that are no longer active

31
New cards

You can devide iSCSI nodes into one or more groups called

discovery domains

32
New cards

Discovery Domains allow you to

make iSCSI initiators only refer to iSCSI targets in the same one

33
New cards

What is Data Center Bridging

a collection of standards-based networking technologies defined by The Institute of Electrical and Electronics Engineers Inc. (IEEE). It allows multiple types of traffic to run on the same physical Ethernet network cables in the data center. Data Center Bridging uses hardware-based bandwidth allocation and priority-based flow control instead of the operating system having to manage the traffic itself.

34
New cards

Multiple Connected Sessions (MCS) is a feature that allows for

Enables multiple TCP/IP connections from the initiator to the target for the same iSCSI session.

Supports automatic failover. If a failure occurs, all outstanding iSCSI commands are reassigned to another connection automatically.

Requires explicit support by iSCSI storage area network (SAN) devices.

35
New cards

Multipath I/O (MPIO) provides redundancy by

If you have multiple network interface cards in your iSCSI initiator and iSCSI target server, you can use MPIO to provide failover redundancy during network outages.

MPIO requires a device-specific chapter (DSM) for when you want to connect to a third-party SAN device that's connected to the iSCSI initiator. The Windows operating system includes a default MPIO DSM that's installed as the MPIO feature within Server Manager.

MPIO is widely supported. Many SANs can use the default DSM without any more software, while others require a specialized DSM from the manufacturer.

MPIO is more complex to configure, and it isn't as fully automated during failover as MCS.

36
New cards

What does Data Deduplication do

Scan files, divides those file into chunks, and retains only one copy of each chunk

37
New cards

After deduplication files are not stored as independent data instead they are replaced with what that points to the data on the common chunk

stub

38
New cards

where are files kept after deduplication

in common chunks

39
New cards

data deduplication may do what to overall disk performance

improve it

40
New cards

data deduplication run as a

scheduled task that can have minimum age requirements set

41
New cards

The components of data deduplication role

Filter Driver

Deduplication service

Garbage Collection

42
New cards

Filter Driver

Monitors local or remote input/output (I/O) and manages the chunks of data on the file system by interacting with the various jobs. There is one for every volume.

43
New cards

Deduplication service

Consist of multiple jobs that perform both deduplication and compression of files according to the data deduplication policy for the volume. After initial optimization of a file, if the file is then modified and meets the data deduplication policy threshold for optimization, the file will be optimized again.

44
New cards

Garbage collection

Consist of jobs that process deleted or modified data on the volume so that any data chunks no longer being referenced are cleaned up. This job processes previously deleted or logically overwritten optimized content to create usable volume-free space. When an optimized file is deleted or overwritten by new data, the old data in the chunk store isn't deleted immediately. This can also be scheduled to run or ran manually.

45
New cards

Data Deduplication has built in data integrity features such as

checksum validation and metadata consistency checking

46
New cards

Data Deduplication will try to rebuild corrupted data by using

Backup copies

Mirror Image

New Chunk

47
New cards

Backup copies

Deduplication keeps backup copies of popular chunks (chunks referenced over 100 times) in an area called the hotspot. If the working copy suffers a soft damage such as bit flips or torn writes, deduplication uses its redundant copy.

48
New cards

Mirror image

If using mirrored Storage Spaces, deduplication can use the mirror image of the redundant chunk to serve the I/O and fix the corruption.

49
New cards

New chunk

If a file is processed with a chunk that is corrupted, the corrupted chunk is eliminated, and the new incoming chunk is used to fix the corruption.

50
New cards

Because of the additional validations in deduplication, it may be one of the first system,s to report any early signs of

data corruption in the hardware or file system

51
New cards

Unoptimization does what

undoes deduplication on all the optimized files on the volume.

52
New cards

some jobs for unoptimization

decommissioning a server with volumes enabled for Data Deduplication, troubleshooting issues with deduplicated data, or migration of data to another system that doesn't support Data Deduplication.

53
New cards

what should you do before running unoptimization

Disable-DedupVolume in Windows PowerShell

54
New cards

three main types of data deduplication

source, target (or post-process) deduplication, and in-line (or transit) deduplication

55
New cards

what are optimized files

files that are stored as reparse points, and that contain pointers to a map of the respective chunks in the chunk store that are needed to restore the file when it's requested.

56
New cards

Chunk store

location for the optimized file data

57
New cards

Data deduplication is designed to be applied on

primary data volumes

58
New cards

Data deduplication can be scheduled based on

the type of data that is involved, and the frequency and volume of changes that occur to the volume or particular file types.

59
New cards

Data Deduplication should be considered for the following data types

General file shares, software deployment shares, VHD Libraries, VDI deployments, and Virtualized Backup

60
New cards

General file share are

These include group content publication and sharing, user home folders, and Folder Redirection/Offline Files.

61
New cards

Software deployment share are

These are software binaries, images, and updates.

62
New cards

VHD Libraries are

These are Virtual Hard Disk (VHD) file storage for provisioning to hypervisors.

63
New cards

VDI deployments are

These are Virtual Desktop Infrastructure (VDI) deployments using Microsoft Hyper-V.

64
New cards

Virtualized backup is

These include backup applications running as Hyper-V guests and saving backup data to mounted VHDs.

65
New cards

When applied to the correct data, deduplication can save up to

50 to 90 percent of a systems storage

66
New cards

What is an example of a bad file to have data deduplication run on

Files that are often changed and accessed by users or applications

67
New cards

How can you see what saving DeDuplication will give you

by using the Deduplication Evaluation Tool

68
New cards

what savings can you expect to see on User Documents

30 to 50 percent

69
New cards

what savings can you expect to see on Software deployment shares

70 to 80 percent

70
New cards

what savings can you expect to see on Virtualization libraries

80 to 95 percent

71
New cards

what savings can you expect to see on General file shares

50 to 60 percent

72
New cards

ideal candidates for deduplication

Folder redirection servers

Virtualization depot or provisioning library

Software deployment shares

Microsoft SQL Server and Microsoft Exchange Server backup volumes

Scale-out File Servers (SOFS) Cluster Shared Volumes (CSVs)

Virtualized backup VHDs (for example, Microsoft System Center Data Protection Manager)

Virtualized Desktop Infrastructure VDI VHDs (only personal VDIs)

73
New cards

non ideal candidates for deduplication

Microsoft Hyper-V hosts

Windows Server Update Service (WSUS)

SQL Server and Exchange Server database volumes

Data Deduplication interoperability

74
New cards

Windows BranchCache

You can optimize access to data over the network by enabling this on Windows Server and Windows client operating systems. When this is enabled the system communicates over a wide area network (WAN) with a remote file server that's enabled for Data Deduplication, all the deduplicated files are already indexed and hashed, so requests for data from a branch office are quickly computed. This is similar to preindexing or prehashing.

75
New cards

you shouldn't create a hard quota on a volume root folder enabled for Data Deduplication, instead you should use

A soft quota

76
New cards

Data Deduplication is compatible with

Distributed File System (DFS) Replication

77
New cards

Distributed File System (DFS) replication works by

remote differential compression

78
New cards

you can backup and restore individual files and dull volumes using

Data Deduplication

79
New cards

You can create optimized file-level backups/restores using

Volume Shadow Copy Service (VSS) writer

80
New cards
81
New cards

Sever Message Block (SMB) is

a network file sharing protocol that allows computers to read and write and request services from server programs on a network

82
New cards

SMB Protocol is located at which layer of the TCP/IP model

Top layer Application

83
New cards

SMB 3.1.1 supports

Advanced Encryption Standard (AES), 128 Galois/Counter Mode (GCM) encryption and many more

84
New cards

Hyper-V supports storing victual machine data such as config files, checkpoints, and .vhd files on

an SMB 3.0 and later file share

85
New cards

Bandwidth should be at least ““ to file share

1 Gbps

86
New cards

SMB 3.0 allows for storing VM file instead of using

Internet Small Computer System Interface (iSCSI) or Fibre Channel storage area network (SAN) devices.

87
New cards

Scale out File Server is

a high availability approach to storing files on a highly available SMB 3.1.1 file share

88
New cards

Why is Scale out File Server particularly useful for VMs

it allows them to store their files including their config files somewhere on the network

89
New cards

SMB Transparent Failover

This feature enables you to perform the hardware or software maintenance of nodes in a clustered file server without interrupting server applications that are storing data on file shares.

90
New cards

SMB Scale Out

By using Cluster Shared Volumes (CSV) version 2, you can create file shares that provide simultaneous access to data files, with direct input/output (I/O), through all the nodes in a file server cluster.

91
New cards

SMB Multichannel

This feature enables you to aggregate network bandwidth and network fault tolerance if multiple paths are available between the SMB 3.0 client and server.

92
New cards

SMB Direct

This feature supports network adapters that have the Remote Direct Memory Access (RDMA) capability and can perform at full speed with very low data latency and by using very little central processing unit (CPU) processing time.

93
New cards

SMB Encryption

This feature provides the end-to-end encryption of SMB data on untrusted networks, and it helps to protect data from eavesdropping.

94
New cards

Volume Shadow Copy Service (VSS) for SMB file shares

To take advantage of VSS for SMB file shares, both the SMB client and the SMB server must support SMB 3.0 at a minimum.

95
New cards

SMB Directory Leasing

This feature improves branch office application response times. It also reduces the number of round trips from the client to the server as metadata is retrieved from a longer-living directory cache.

96
New cards

Pre-authentication integrity provides

improved protection from a man-in-the-middle attack that might tamper with the establishment and authentication of SMB connection messages.

97
New cards

Cluster Dialect Fencing provides

support for cluster rolling upgrades for the Scale-Out file Servers feature.

98
New cards

SMB will use the highest version that

the client and server support

99
New cards

ways to create and share files

File Explorer, Admin Center, PowerShell, Server Manager

100
New cards

The permissions a user must use to gain access to a folder are a combination of

share permissions and file permissions