CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 283 Weeks Ago, 5 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Computer Science Posted 26 Dec 2017 My Price 10.00

Distributed File System role service

1.     The Distributed File System role service provides which of the following? (Choose all that apply.)

a.     Access to files across the network

b.     Replacement for regular backups

c.     Copies of files created automatically for redundancy

d.     Fault-tolerant access to files

2.     Which of the following is true about the two types of namespaces?

a.     Stand-alone namespaces always use more bandwidth.

b.     Domain-based namespaces remain regardless of the server status where the share resides.

c.     Domain-based namespace includes the current server name for faster name resolution.

d.     Stand-alone namespace can’t be replicated.

3.     Folders added to a namespace can be described as which of the following?

a.     Copies of existing folders

b.     Copies of existing folders that are initially empty

c.     Pointers to existing shared folders

d.     Copied to a staging area automatically

4.     In DFS, what are the differences between Windows Server 2008 mode and Windows Server 2000 mode?

a.     Server 2008 mode supports 15,000 folders and access-based enumeration, and Server 2000 mode supports 5000 folders.

b.     Server 2008 mode supports 75,000 folders, and Server 2000 mode supports 10,000 folders.

c.     Nothing a user can see.

d.     Server 2008 mode supports 50,000 folders and access-based enumeration, and Server 2000 mode supports 5000 folders.

5.     Where does a referral originate when a client accesses a DFS namespace?

a.     From the namespace server

b.     From the domain controller

c.     From the namespace server for a stand-alone type and from the domain controller for a domain-based type

d.     From a cached copy of referrals on the server where the share is located

6.     What’s the default ordering method for referrals?

a.     No default; you must choose an ordering method during initial configuration.

b.     Random order to ensure load balancing.

c.     Lowest cost, selecting the closest server first.

d.     The order in which the target servers were defined.

 

 

 

 

 

7.     If a client is on the same site as a particular target, what will it do?

a.     Follow the referral ordering method.

b.     Always go to that target.

c.     Ignore the targets on the same site.

d.     Go to a target randomly.

8.     How can referral order be customized?

a.     There’s no way to customize the referral order.

b.     Exclude targets in the client’s site.

c.     Use the Override Referral Ordering option.

d.     Put in nonexistent targets, forcing the system to follow your custom order.

9.     When should share permissions be set?

a.     Before DFS configuration.

b.     During DFS configuration.

c.     After DFS configuration is finished.

d.     Never; DFS handles all permissions.

10.  DFS replication configuration requires a minimum of how many targets?

a.     1

b.     2

c.     3

d.     4

11.  Which is the best method of synchronization to reduce bandwidth with a DFS replication group made up of a main office and eight branch offices?

a.     Full mesh topology

b.     Hub and spoke topology

c.     Round robin topology

d.     Random synchronization

12.  What’s the algorithm used to replicate only changes made in files?

a.     Remote replication connection

b.     Remote change comparison

c.     Remote differential compression

d.     Remote change compression

13.  Where are changed files cached until replication is finished?

a.     Caching folders in the C:DFScache folder on the namespace server.

b.     The Staging folder on the target server.

c.     No caching is done.

d.     The Staging folder for the folder being replicated.

 

 

 

 

14.  What’s the model used when there’s an update conflict?

a.     Last writer wins; losing file is cached.

b.     First writer wins; losing file is cached.

c.     First writer wins; losing file is deleted.

d.     Last writer wins; losing file is deleted.

15.  What are the two types of quotas you can create with File Server Resource Manager?

a.     Hard and soft

b.     Hard and notify

c.     Limit and notify

d.     Final and minimum

16.  Which of the following is an advantage of using quota templates? (Choose all that apply.)

a.     They can’t be applied to new volumes that come online later.

b.     Quotas can be changed in the template and applied to all volumes using that quota previously.

c.     The template can be named and have a description included for future reference.

d.     Properties can be copied from an existing template.

17.  What are the two types of file screens you can create with File Server Resource Manager?

a.     Hard and soft

b.     Active and passive

c.     Active and notify

d.     Restrict and notify

18.  A file screen is used to do which of the following? (Choose all that apply.)

a.     Limit access to certain types of files.

b.     Screen files for malware and viruses.

c.     Analyze file use and restrict use to maximize network bandwidth.

d.     Send a notification about access to certain types of files.

19.  Which of the following is a method for defining elements in a file group? (Choose all that apply.)

a.     Filenames

b.     Namespaces

c.     Folder names

d.     Filename patterns

20.  Storage reports can show which of the following? (Choose all that apply.)

a.     File-screening violations

b.     Files by owner

c.     Files by permissions

d.     Quota use

 

 

 

21.  Which FSRM feature should you use if you want to set certain attributes of a file automatically based on its content?

a.     File Screening Management

b.     Quota Management

c.     Classification Management

d.     Storage Reports Management

22.  Which of the following should you create if you want all files that haven’t been accessed in more than six months moved to a special folder?

a.     File-screening action

b.     File expiration task

c.     File storage job

d.     Quota report

23.  Which of the following is true about EFS?

a.     An EFS certificate is created automatically, if necessary.

b.     It’s supported only on NTFS and ReFS volumes.

c.     Encrypted files that are moved to another folder must be encrypted again.

d.     EFS can be configured only on files.

24.  Which of the following is true about BitLocker Drive Encryption?

a.     It can’t be used to encrypt the Windows boot volume.

b.     Only computers with a TPM can use it.

c.     Network Unlock allows a system to boot without a PIN.

d.     A startup key is stored in the Windows folder.

Answers

(12)
Status NEW Posted 26 Dec 2017 01:12 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------s. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill-----------

Not Rated(0)