0% found this document useful (0 votes)
4 views6 pages

State Exam Preparaion

The document contains a series of state exam preparation questions covering various topics in IT, including file-level and block-level storage, Fibre Channel topologies, host bus adapters, disk arrays, and server operating systems. It also discusses cloud deployment methods, domain controller roles, DNS configuration, and load balancing. The questions are designed to test knowledge on network infrastructure, server management, and virtualization technologies.

Uploaded by

sronosrithy168
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views6 pages

State Exam Preparaion

The document contains a series of state exam preparation questions covering various topics in IT, including file-level and block-level storage, Fibre Channel topologies, host bus adapters, disk arrays, and server operating systems. It also discusses cloud deployment methods, domain controller roles, DNS configuration, and load balancing. The questions are designed to test knowledge on network infrastructure, server management, and virtualization technologies.

Uploaded by

sronosrithy168
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

State Exam Preparation Questions

Lecturer: SAMRITH SEM, E-mail: samrith_sem@hotmail.com, Phone Contact: 016 676869

Q1. Explain File-Level Storage


This storage technology is most commonly used for storage systems, which is found in hard drives, NAS
systems and so on. In this File Level storage, the storage disk is configured with a protocol such as NFS or
SMB/CIFS and the files are stored and accessed from it in bulk.

Q2. Block-Level Storage


Raw volumes of storage are created and each block can be controlled as an individual hard drive. These Blocks
are controlled by server based operating systems and each block can be individually formatted with the required
file system.

Q3. Fibre Channel Topologies


Fundamentally, fibre channel defines three configurations:

- Point-to-point
Point-to-point fibre channel is a simple way to connect two (and only two) devices directly together. It is the
fibre channel equivalent of direct attached storage (DAS).

1
- Arbitrated Loops
It is a set of hosts and devices that are connected into a single loop. It is a cost-effective way to connect up to
126 devices and hosts into a single network.

- Fibre Channel Switched Fabric


Devices are connected in a many-to-many topology using fibre channel switches. When a host or device
communicates with another host or device, the source and target setup a point-to-point connection (just like a
virtual circuit) between them and communicate directly with each other. The fabric itself routes data from the
source to the target. In a fibre channel switched fabric, the media is not shared. Any device can communicate
with any other device (assuming it is not busy) and communication occurs at full bus speed (1Gbit/Sec or
2Gbit/sec today depending on technology) irrespective of other devices and hosts communicating.

Q4. What is HBA?


A host bus adapter (HBA) is an interface card that resides inside a server or a host computer. It is the functional
equivalent of the network adapter in a traditional Ethernet network. All traffic to the storage fabric or loop is
done via the HBA.
FC HBA iSCSI HBA

Q5. What is Disk Array?

2
A disk array is a hardware element that contains a large group of Hard Disk drives (HDDs). It may contain
several disk drive trays and has an architecture which improves speed and increases data protection. The system
is run via a storage controller, which coordinates activity within the unit.

Q6. What is the difference between a server and a client operating system?
The difference between a server and a client operating system is that a server provides resources to many users
on a network, and a client operating system is used by only one user at a time.
Q7. Which type of cloud would you use to deploy a custom virtual machine running Windows Server
2012?
You would deploy a custom virtual machine to an IaaS cloud, which could be either a public cloud or a private
cloud.
Q8. Which roles are often co-located on the same server?
Domain Name System (DNS) and Active Directory® Domain Services (AD DS) are often co-located.
Q9. Why does a server need more hard disk drive space if it has more than 16 GB of RAM?
A server needs more hard disk drive space because it requires additional hard disk space for virtual memory.
Q10. In what situation would you perform an offline domain join rather than a traditional domain join?
You would you perform an offline domain join when deploying a server to a remote site with intermittent
network connectivity.
Q11. What are the advantages to performing a Server Core deployment compared to the full GUI
deployment?
The advantages are that the operating system will require fewer updates and fewer hardware resources.
Q12. Which role can you use to manage KMS?
The Volume Activation Services role allows you to manage KMS.
Q13. Should a domain controller be a global catalog?
Every domain controller should be a global catalog. (In some extreme situations, there might be a reason not to
do so.) However, most large, distributed organizations are doing just that, so it also makes sense for less
complex, smaller organizations.
Q14. Why did you use Server Manager and not dcpromo.exe when you promoted a server to be a domain
controller?
In Windows Server 2012, dcpromo.exe is deprecated and its uses are limited. For example, it is only used at a
command prompt, such as to perform an unattended installation of AD DS, or when it is necessary to do a
complete domain controller promotion from a command–line interface. Server Manager is the preferred tool to
use, or you can use Windows PowerShell® or some other scripted method.
Q15. What are the three operations masters found in each domain?
The three operations masters are:

3
• Relative ID (RID) masters
• Infrastructure master
• Primary domain controller (PDC) emulator masters

Q16. What are the two operations masters that are present in a forest?
The two operations master that are present in a forest are the schema master and the domain naming master.
Q17. What is the benefit of performing an Install From Media (IFM) install of a domain controller?
When you have an unreliable wide area network (WAN) link, performing an IFM install reduces the use of the
WAN link and provides for a more reliable installation process.
Q18. What are the two main purposes of OUs?
The two main purposes of OUs are to provide a framework for delegations of administration and to provide a
structure to enable the targeted deployment of GPOs.
Q19. Why would you need to deploy an additional tree in the AD DS forest?
You would want to deploy an additional tree in the AD DS forest if you needed more than one DNS namespace.
Q20. Which deployment method would you use if you had to install an additional domain controller in a
remote location that had a limited WAN connection?
You would use the IFM option, because it eliminates the need to copy the entire AD DS database over the WAN
link.
Q21. If you needed to promote a Server Core installation of Windows Server 2012 to be a domain
controller, which tool or tools could you use?
To promote a Server Core installation of Windows Server 2012 to a domain controller, you could use the
following tools:
• Server Manager, which would allow you to install AD DS remotely
• Windows PowerShell 3.0
• Run the command dcpromo /unattend on the Server Core server

Q22. Do any computers or devices in your organization have static IP addresses?


In most cases, servers have static IP addresses. Other network devices such as printers also typically have static
IP addresses.
Q23. For what is the DHCP scope used?
The DHCP scope defines what information is leased to DHCP clients through the DHCP process, such as the IP
address, the subnet mask, the DNS server IP address, and the Default Gateway IP address.
Q24. How should you configure a computer to receive an IP address from the DHCP server?
You should not have to do anything. The computer should be configured to obtain its IP address automatically.
Q25. You are troubleshooting DNS name resolution from a client computer. What must you remember to
do before each test?
You should clear the resolver cache before starting to troubleshoot.

4
Q26. You are deploying DNS servers into an Active Directory domain, and your customer requires that
the infrastructure is resistant to single points of failure. What must you consider when planning the DNS
configuration?
You should deploy more than one AD DS domain controller with the DNS server role installed.
Q27. What benefits do you realize by using forwarders?
Forwarders are used when your local DNS server cannot resolve a query from the client using its own local
zones. You usually configure forwarders to resolve Internet names. However, you can also use forwarders to
optimize performance, to optimize Internet link usage on your local DNS server, and to enhance security.
Q28. What is the main difference between 6to4 and Teredo?
Both protocols allow IPv6 connectivity over the IPv4 Internet. However, only Teredo is able to provide
connectivity through NAT.
Q29. How can you provide a DNS server to an IPv6 host dynamically?
To provide a DNS server to an IPv6 host dynamically, you must use DHCPv6. You can use router
advertisements to provide the network portion of an IPv6 address, but router advertisements cannot distribute
DNS server IP addresses.
Q30. Your organization is planning to implement IPv6 internally. After some research, you have
identified unique local IPv6 addresses as the correct type of IPv6 addresses to use for private networking.
To use unique local IPv6 addresses, you must select a 40-bit identifier that is part of the network. A
colleague suggests using all zeros for the 40 bits. Why is this not a good idea?
The 40-bit organization identifier in a unique local IPv6 address should be randomly generated. This ensures the
greatest likelihood that no two organizations are using the same organization identifier. If two organizations use
the same organization identifier, then the networks cannot be joined together after a merger.
Q31. What file system do you currently use on your file server? Will you continue to use it?
A common answer is NTFS, because NTFS should be the basis for any file system used on a Windows Server
operating system. If you use FAT32 or Extended FAT (exFAT), you should be able to support your decision,
because these file systems do not support security access control lists (ACLs) on files and folders.
Q32. What is the name for a virtual disk that is larger than the amount of disk space available on the
physical disks portion of the storage pool?
This kind of virtual disk is a thin provisioned virtual disk. With a thin provisioned virtual disk, you can use the
available space immediately, but you need to add more physical disks to the storage pool to provide the disk
space required.
Q33. What is Load Balancing?

Load balancing is a core networking solution responsible for distributing incoming traffic among servers hosting the same app
application requests across multiple servers, a load balancer prevents any application server from becoming a single point of fa
application availability and responsiveness. For example, when one application server becomes unavailable, the load balancer
requests to other available servers in the pool.
Q33. What is Load Balancer?
A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a
number of servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications.

5
Q34. What is failover cluster?
A failover cluster is a group of servers that work together to maintain high availability of applications and
services. If one of the servers, or nodes, fails, another node in the cluster can take over its workload without any
downtime (this process is known as failover).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy