Deck 8: Designing High Availability and Business Continuity
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 8: Designing High Availability and Business Continuity
1
____ is when one node in a failover cluster fails, another instance will take over for the failed node.
A) Failsafe
C) Failback
B) Activation
D) Failover
A) Failsafe
C) Failback
B) Activation
D) Failover
D
2
In an NLB Cluster, ____ is the most common mode used, and is recommended in Microsoft documentation.
A) unicast
C) multicast
B) broadcast
D) Internet group multicast
A) unicast
C) multicast
B) broadcast
D) Internet group multicast
A
3
Servers within a failover cluster are referred to as ____.
A) units
C) components
B) nodes
D) hosts
A) units
C) components
B) nodes
D) hosts
B
4
The choice of quorum model largely depends on ____.
A) the number of nodes in the cluster
C) the resources of the cluster
B) the services being balanced
D) the network performance
A) the number of nodes in the cluster
C) the resources of the cluster
B) the services being balanced
D) the network performance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
If the user account is located in an OU, the OU is not included in the DN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
With ____, server load is balanced across each of the servers and progressively more clients can be added without degrading the service.
A) scale up
B) scale out
C) vertical scaling
D) linear scaling
A) scale up
B) scale out
C) vertical scaling
D) linear scaling
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The Windows Server Backup feature isn't installed by default.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ feature of Windows Server 2008 can increase stability and provide scalability for applications and services.
A) System Load Balancing
C) Operations Load Balancing
B) Service Load Balancing
D) Network Load Balancing
A) System Load Balancing
C) Operations Load Balancing
B) Service Load Balancing
D) Network Load Balancing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Failover clusters can be used to provide fault tolerance at the disk level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
When using NLB, you should obtain a certificate using the ____ of the cluster as the common name in the certificate.
A) IP Address
C) fully qualified domain name
B) distinguished name
D) domain name
A) IP Address
C) fully qualified domain name
B) distinguished name
D) domain name
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ is traditional disk storage format for Windows, but it has a 2 Terabyte (TB) maximum size, which can sometimes be a concern for failover clusters.
A) partition boot record
C) master boot record
B) master file table
D) file allocation table
A) partition boot record
C) master boot record
B) master file table
D) file allocation table
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The primary tool you'll use to create and configure NLB clusters is the ____.
A) Computer Manager
C) Network Load Balancing Manager
B) Server Manager
D) Networking Center
A) Computer Manager
C) Network Load Balancing Manager
B) Server Manager
D) Networking Center
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ means that a service is available when it's needed.
A) High availability
B) Load availability
C) Load balancing
D) Continuity availability
A) High availability
B) Load availability
C) Load balancing
D) Continuity availability
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is when a failed node comes back online, services that moved to another node in the cluster can be returned to the original node.
A) Failover
C) Regression
B) Failback
D) Restoration
A) Failover
C) Regression
B) Failback
D) Restoration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
In the ____ model nodes and the disk are allowed to vote in the quorum.
A) node majority
C) disk and service majority
B) service majority
D) node and disk majority
A) node majority
C) disk and service majority
B) service majority
D) node and disk majority
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ is the standard or traditional method used to connect to disk storage solutions.
A) Ethernet
C) Serial Attach SCSI
B) Token ring
D) Fibre Channel
A) Ethernet
C) Serial Attach SCSI
B) Token ring
D) Fibre Channel
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ includes all the methods and technologies used to ensure that a business can continue to operate even after a failure occurs.
A) Disaster recovery
B) Business recovery
C) Business continuity
D) Operations continuity
A) Disaster recovery
B) Business recovery
C) Business continuity
D) Operations continuity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
There's no difference between fault tolerance at the disk level and at the server level.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
An authoritative restore can mark a single object (such as the CEO's account), an entire OU, or the entire Active Directory database as authoritative.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
One percent downtime equates to more than ____ of downtime in a year.
A) 5 minutes 15 seconds
B) 52 minutes 34 seconds
C) 8 hours 46 minutes
D) 87 hours 36 minutes
A) 5 minutes 15 seconds
B) 52 minutes 34 seconds
C) 8 hours 46 minutes
D) 87 hours 36 minutes
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
During normal operation, any changes, modifications, and deletions that occur on one domain controller are replicated to all other domain controllers in the same site in approximately ____.
A) one minute
C) 12 hours
B) one hour
D) 24 hours
A) one minute
C) 12 hours
B) one hour
D) 24 hours
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The ___________________ tools feature in Windows Server Backup includes support for doing backups with Windows PowerShell commands and scripts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
If you want to back up only system state data using the Wbadmin command-line tool, you can use the following command:
A) Wbadmin delete systemstatebackup -backuptarget:x:
B) Wbadmin start systemstatebackup -backuptarget:x:
C) Wbadmin start sysrecovery -backuptarget:x:
D) Wbadmin start systemstaterecovery -backuptarget:x:
A) Wbadmin delete systemstatebackup -backuptarget:x:
B) Wbadmin start systemstatebackup -backuptarget:x:
C) Wbadmin start sysrecovery -backuptarget:x:
D) Wbadmin start systemstaterecovery -backuptarget:x:
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ___________________ is a group of independent servers configured together to provide high availability of a service or application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The ________________________ feature adds the services used for backup and restore, and includes support for both the Windows Server Backup console and the Wbadmin command-line tool.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Discuss the hardware and shared storage requirements of a failover cluster.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Describe how an authoritative restore of a single record will be properly replicated to the remainder of the directory.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
How can load balancing and fault tolerance be achieved?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Explain the results of pausing, stopping and evicting a node.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Active Directory uses ____ to identify the most current version of all objects.
A) Target Sequence Numbers
C) Update Sequence Numbers
B) Activity Sequence Numbers
D) Version Sequence Numbers
A) Target Sequence Numbers
C) Update Sequence Numbers
B) Activity Sequence Numbers
D) Version Sequence Numbers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe how to add hosts to an NLB cluster.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
___________________ rules are used to identify the traffic that will be balanced by the NLB cluster.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Identify a limitation of using the native backup tools for Active Directory.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Explain how and why a failover clusters should be removed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The ____ can be used to validate the hardware used in the failover cluster and the configuration of a cluster.
A) Configuration wizard
C) Operational Validation wizard
B) System Configuration Validation wizard
D) Validate a Configuration wizard
A) Configuration wizard
C) Operational Validation wizard
B) System Configuration Validation wizard
D) Validate a Configuration wizard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Explain how the network address is assigned in a NLB cluster.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
When performing an authoritative restore with NTDSUtil, you use the ____ of the object.
A) common name
C) fully qualified domain name
B) distinguished name
D) short host name
A) common name
C) fully qualified domain name
B) distinguished name
D) short host name
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The ____ console is used to validate the hardware configuration of nodes and to create and manage clusters.
A) Failover Cluster Management
C) Network Load Balancing Manager
B) Computer Manager
D) Server Manager
A) Failover Cluster Management
C) Network Load Balancing Manager
B) Computer Manager
D) Server Manager
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
___________________ are commonly used to achieve high availability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Explain how to perform an authoritative restore.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List and describe the steps to perform a non-authoritative restore.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck