Microsoft Microsoft Certifications 98-365 Questions & Answers
Question 301:
Which form of RAID is not fault tolerant?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 0+1
Correct Answer: A
RAID 0 stripes data across all drives. Because RAID 0 has no parity control or fault tolerance, it is not a true form of RAID. Here, if one drive fails, you lose all data on the array.
Question 302:
Which of the following technologies is considered a network attached storage protocol?
A. NFS
B. FCoE
C. Fiber Channel
D. iSCSI
Correct Answer: A
NFS (Network File System) is considered a network attached storage protocol. It is used to enable communication between an NFS client and an NFS server. The NFS client that is built into ESX supports in accessing the NFS server and in
using NFS volumes for storage.
Incorrect Answers:
B, C, D: These are all considered block storage protocols.
Question 303:
Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of resources?
A. SCSI
B. SSL
C. TLS
D. iSNS
Correct Answer: D
Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management, and configuration of iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. iSNS provides management services similar to those found in Fibre Channel networks, allowing a standard IP network to operate in much the same way that a Fibre Channel storage area network does. Because iSNS is able to emulate Fibre Channel fabric services and manage both iSCSI and Fibre Channel devices, an iSNS server can be used as a consolidated configuration point for an entire storage network.
Incorrect Answers:
A: Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk drive and CD-ROM drive, are better suited in a network environment in which many users access shared drives simultaneously. SCSI has three standards: SCSI-1, SCSI-2, and SCSI-3.
B: The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. URLs that require an SSL connection start with https: instead of http:.
C: Transport Layer Security is a standard protocol used to secure Web communications on the Internet or intranets by means of encryption. With the help of TLS, clients can authenticate servers or servers can authenticate clients. TLS is the latest version of the Secure Sockets Layer (SSL) protocol.
Question 304:
You are configuring a RAID 5 solution on a server running Windows Server 2016. You are using five 750GB hard drives in the RAID array.
How much free space will you get after configuring the RAID 5 solution?
A. 2,250
B. 1,500
C. 3,000
D. 3,750
Correct Answer: C
After configuring the RAID 5 solution, you get 3,000GB free space. You can calculate free space for a RAID 5 solution using the following formula: Available free space for RAID 5 = Total drive space - 1/n (Total drive space) where, n is the number of hard drives According to the question: = 5 x 750 = 3,750GB Free space for the RAID 5 solution = 3,750 - 1/5 (3,750) = 3,750 ?750 = 3,000GB
Question 305:
Which of the following file systems centralizes data and can be used to replicate shared folders to other servers?
A. ADFS
B. FAT32
C. DFS
D. NTFS
Correct Answer: C
DFS (Distributed File System) centralizes data and can be used to replicate shared folders to other servers. Distributed File System (DFS) allows users to access files located on another remote host as though working on the actual host computer. This makes it possible for multiple users on multiple machines to share files and storage resources. The client nodes do not have direct access to the underlying block storage but interact over the network using a protocol. Distributed file systems may include facilities for transparent replication and fault tolerance. That is, when a limited number of nodes in a file system go offline, the system continues to work without any data loss.
Incorrect Answers:
A: Active Directory Federation Services (ADFS) is used to extend the ability to use single sign-on functionality to Internet-facing applications. With the help of single sign-on and ADFS, a user can give their customers, partners, and suppliers easy access to Web based applications in the organization, such as Outlook Web App.
B: The FAT32 file system is an enhancement of the FAT file system. It is more advanced and reliable than all the earlier versions of the FAT file system. It manages storage space on large hard disks more efficiently than the FAT16 file system. It uses a smaller cluster size than the FAT16 file system on the hard disk, thereby reducing the amount of space on the hard disk when users save small files. The FAT32 file system supports hard disk drives larger than 2GB and up to 2TB.
D: NTFS is a high-performance file system proprietary to Microsoft. NTFS supports file-level security, compression, and auditing. It also supports large volumes and powerful storage solution such as RAID. The latest feature of NTFS is its ability to encrypt files and folders to protect sensitive data.
Question 306:
You work as a System Administrator for company Inc. The Microsoft iSCSI initiator service is deployed in the organization in order to allow Windows Server 2016 to connect to SCSI devices that are attached to a network.
You want to remove all persistently bound volumes and devices for the iSCSI service.
Which of the following iSCSICLI commands will you use to accomplish the task?
A. iSCSICLI AddPersistentDevices
B. iSCSICLI AddTarget
C. iSCSICLI ClearPersistentDevices
D. iSCSICLI RemovePersistentDevices
Correct Answer: C
In order to accomplish the task, you should use the iSCSICLI ClearPersistentDevices command. When you use this command on the command-line interface, it removes all persistently bound volumes and devices for the iSCSI service.
The network-attached storage (NAS) device is a file server running on a dedicated device connected to the network.
Which of the following are the advantages of the NAS device? Each correct answer represents a complete solution. Choose all that apply.
A. It enables the Windows, UNIX/Linux, and MacOS to use the same storage and to access the shared data.
B. It is easy to install, configure, and manage by using a web browser.
C. It is used when computer systems are retired and disk drives are required to be zeroed out.
D. It permits the addition of more hard disk storage space to a network without shutting them down for maintenance and upgrades.
Correct Answer: ABD
The network-attached storage (NAS) device is a server used for file sharing. It is a file server running on a dedicated device connected to the network. These types of devices are based on Linux or UNIX derivatives.
Various advantages of the NAS device are as follows:
It is easy to install, configure, and manage by using a web browser.
It enables the Windows, UNIX/Linux, and MacOS to use the same storage and to access the shared data.
It does not require to be located within the server but can be placed anywhere in LAN.
It permits the addition of more hard disk storage space to a network without shutting them down for maintenance and upgrades.
Incorrect Answers:
C: Hard drive wiping is a degaussing process that applies a strong magnetic field for the purpose of initializing the media. It is used to remove data from the hard drive permanently. It is used when computer systems are retired and disk drives are required to be zeroed out.
Question 308:
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2016 domain-based network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails.
What will Mark do to restore the RAID-5 volume?
A. Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.
B. Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.
C. Use Disk Management, select the failed drive, and then regenerate the volume.
D. Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.
Correct Answer: B
In order to restore the RAID-5 volume, Mark will have to replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume. When a member of a mirrored volume or a RAID-5 volume fails, it becomes an orphan. Data for the orphaned member can be regenerated from the remaining members. A new area of free space that is of the same size or larger than the other members of the RAID-5 volume should be selected in Disk Management and then the data should be regenerated. The fault-tolerance driver reads the information from the stripes on the other member disks, and then re-creates the data of the missing member and writes it to the new member on restarting the computer. The volume must be locked by the operating system to regenerate a RAID-5 volume. All network connections to the volume will be lost when a volume is regenerated.
Question 309:
You are using self-healing NTFS in Microsoft Windows Server 2016.
Which of the following are functions of self-healing NTFS? Each correct answer represents a complete solution. Choose all that apply.
A. It decreases failed file system mounting requests that occur due to inconsistencies during restart or for an online volume.
B. It identifies and recovers an NTFS volume.
C. It provides continuous data availability.
D. It allows an authorized user to administer and monitor repair operations.
Correct Answer: ACD
The various functions of self-healing NTFS are as follows:
It provides continuous data availability.
It saves data.
It decreases failed file system mounting requests that occur due to inconsistencies during restart or for an online volume.
It offers better reporting.
It allows an authorized user to administer and monitor repair operations.
It recovers a volume if the boot sector is readable, but it does not identify an NTFS volume.
It authenticates and maintains data within critical system files.
You work as a Server Administrator for company Inc. The company has a Windows Server 2016 based network environment. There are thirty client computers running Windows 10 and three servers running Windows Server 2016.
You need to implement a system in the network that provides data access to heterogeneous network clients using SMB/CIFS.
Which of the following will you use?
A. Storage area network
B. Failover clustering
C. Datafile striping
D. Network-attached storage
Correct Answer: D
You should use Network-attached storage (NAS).
Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous network clients. NAS systems contain one or more hard disks, often arranged into logical,
redundant storage containers or RAID arrays.
It removes the responsibility of file serving from other servers on the network. NAS uses file-based protocols, such as NFS, SMB/CIFS, or AFP.
NAS units rarely limit clients to a single protocol.
Incorrect Answers:
A: Storage Area Networks are a specialized RAID array that can be accessed by multiple servers over a specialized network connection. A host bus adapter is required on servers that use the Storage Area Networks. The Storage Area Networks administrator partitions the available storage into logical unit numbers and assigns them to the servers. The disk volume shown in Disk manager is logical unit numbers. SAN use block-level protocols such as iSCSI or Fiber Channel. They do not use SMB or CIFS.
B: Failover clustering is a technique used in the Windows Server 2016 environment to provide high availability of applications.
C: Datafile striping, also referred to as striping, is a technique used to enhance the I/O of datafiles. In this technique, a large datafile is split into smaller datafiles and the latter are then stored on separate disks. Hence, striping allows quicker I/ Os by reading or writing through multiple read-write heads of the disks (which store the datafiles that have been split) operating in parallel. This technique is of great help in parallel processing where throughput is of prime concern.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-365 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.