MCSA 70-740 MIDTERM QUESTIONS
Which of the following statements are true of striped volumes? - Answers -Striped
volumes provide enhanced performance over simple volumes. If a single physical disk
in the striped volume fails, all of the data in the entire volume is lost.
What are some requirments of a dynamic disk? - Answers -When extending a simple
volume, you can use only the available space on the same disk, if the volume is to
remain simple. You can extend a simple volume across additional disks if it is not a
system volume or a boot volume
Which volume types do not provide fault tolerance? - Answers -Striped and spanned
volumes
What is the next step after making a VHD? - Answers -Initialize the disk and create
volumes on it as if it were a physical disk.
What is the max size of a NTFS volume with 64kb clusters? - Answers -256 TB
Which permissions on a FAT32 volume enable adding files and folders to a shared
folder? - Answers -Change and full control
Which NTFS permissions are needed to attributes and permissions? - Answers -Full
control
Define explicit and inherited permissions. - Answers -Explicit permissions are assigned
directly to a file or folder. Inherited permissions are granted to a folder and passed down
to other files.
Which method of file sharing is used with UNIX and Linux machines? - Answers -NFS
How do you connect to a shared folder when using NFS? - Answers -You mount the
volume to a local folder.
What permission is needed to open and view a file? - Answers -Read
What permission is needed to make changes to a file? - Answers -Modify
What permission is needed to change NTFS permissions? - Answers -Full control
What permission is needed to delete a file? - Answers -Modify
What permission is needed to view the contents of a folder? - Answers -List folder
contents
, When creating a storage space, which of the following resiliency settings requires at
least five drives? - Answers -Three way mirror
Which of process reserves space for future use when working with storage
spaces/storage pools? - Answers -Thin provisioning
How many disks are needed for parity? - Answers -3
What works best to support the simultaneous failing of two disks? - Answers -Three
way mirror
What would work best for reserving 500GB of storage space in a pool when only 100GB
of actual physical space is available? - Answers -Thin provisioning
Which protocol allows a server to connect to a SAN by sending SCSI commands over a
TCP/IP network? - Answers -iSCSI
What port is used by iSCSI? - Answers -3260
Which client connects with an iSCSI SAN? - Answers -iSCSI initiator
What can be installed so that Windows Server 2016 can be used to present iSCSI
volumes to Windows servers? - Answers -iSCSI target
What is a unique identifier that is used to identify iSCSI initiators and targets? -
Answers -IQN (iSCSI qualified names)
What authentication protocol does iSCSI use? - Answers -CHAP
What can encrypt iSCSI traffic? - Answers -IPsec
What technologies can help make iSCSI highly available? - Answers -MCS and MPIO
What is used to automatically discover, manage, and configure iSCSI devices? -
Answers -iSNS
What is the PowerShell cmdlet should be used to view the iSCSI initiator connections? -
Answers -Get-IscsiConnection
What is used to reduce disk space usage by eliminating blocks of data that are repeated
among files? - Answers -Deduplication
What is the deduplication ratio for general files? - Answers -2:1
What is the deduplication ratio for virtualization data? - Answers -20:1
Which of the following statements are true of striped volumes? - Answers -Striped
volumes provide enhanced performance over simple volumes. If a single physical disk
in the striped volume fails, all of the data in the entire volume is lost.
What are some requirments of a dynamic disk? - Answers -When extending a simple
volume, you can use only the available space on the same disk, if the volume is to
remain simple. You can extend a simple volume across additional disks if it is not a
system volume or a boot volume
Which volume types do not provide fault tolerance? - Answers -Striped and spanned
volumes
What is the next step after making a VHD? - Answers -Initialize the disk and create
volumes on it as if it were a physical disk.
What is the max size of a NTFS volume with 64kb clusters? - Answers -256 TB
Which permissions on a FAT32 volume enable adding files and folders to a shared
folder? - Answers -Change and full control
Which NTFS permissions are needed to attributes and permissions? - Answers -Full
control
Define explicit and inherited permissions. - Answers -Explicit permissions are assigned
directly to a file or folder. Inherited permissions are granted to a folder and passed down
to other files.
Which method of file sharing is used with UNIX and Linux machines? - Answers -NFS
How do you connect to a shared folder when using NFS? - Answers -You mount the
volume to a local folder.
What permission is needed to open and view a file? - Answers -Read
What permission is needed to make changes to a file? - Answers -Modify
What permission is needed to change NTFS permissions? - Answers -Full control
What permission is needed to delete a file? - Answers -Modify
What permission is needed to view the contents of a folder? - Answers -List folder
contents
, When creating a storage space, which of the following resiliency settings requires at
least five drives? - Answers -Three way mirror
Which of process reserves space for future use when working with storage
spaces/storage pools? - Answers -Thin provisioning
How many disks are needed for parity? - Answers -3
What works best to support the simultaneous failing of two disks? - Answers -Three
way mirror
What would work best for reserving 500GB of storage space in a pool when only 100GB
of actual physical space is available? - Answers -Thin provisioning
Which protocol allows a server to connect to a SAN by sending SCSI commands over a
TCP/IP network? - Answers -iSCSI
What port is used by iSCSI? - Answers -3260
Which client connects with an iSCSI SAN? - Answers -iSCSI initiator
What can be installed so that Windows Server 2016 can be used to present iSCSI
volumes to Windows servers? - Answers -iSCSI target
What is a unique identifier that is used to identify iSCSI initiators and targets? -
Answers -IQN (iSCSI qualified names)
What authentication protocol does iSCSI use? - Answers -CHAP
What can encrypt iSCSI traffic? - Answers -IPsec
What technologies can help make iSCSI highly available? - Answers -MCS and MPIO
What is used to automatically discover, manage, and configure iSCSI devices? -
Answers -iSNS
What is the PowerShell cmdlet should be used to view the iSCSI initiator connections? -
Answers -Get-IscsiConnection
What is used to reduce disk space usage by eliminating blocks of data that are repeated
among files? - Answers -Deduplication
What is the deduplication ratio for general files? - Answers -2:1
What is the deduplication ratio for virtualization data? - Answers -20:1