Essay on Lesson 2

951 Words Jul 14th, 2013 4 Pages
Lesson 2
Deploying a File Server
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided. 1. The feature that enables a Windows Server 2008 computer to maintain up to 64 previous versions of a file is called shadow copies.

2. The process of granting users access to file server shares by reading their permissions is called authorization. 3. In Windows, the fat32 file system is limited to volumes no larger than 32 GB.

4. The drive interface that is preferred for network servers is called SCSI.

5. A mirrored drive installation that also uses redundant host adapters is called disk duplexing.

6. The combination of permissions
…show more content…
d. Once created, you cannot extend a simple volume into any adjacent unallocated space on the same disk. 3. Which of the following statements are not true in reference to converting a basic disk to a dynamic disk? a. You cannot convert a basic disk to a dynamic disk if you need to dual boot the computer. b. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes. c. A boot partition or system partition on a basic disk cannot be extended into a striped or spanned volume, even if you convert the disk to a dynamic disk. d. The conversion will fail if the hard drive does not have at least 1 MB of free space at the end of the disk. 4. Which of the following statements are not true about differences between network attached storage (NAS) devices and storage area network (SAN) devices? a. NAS devices provide a file system implementation; SAN devices do not. b. NAS devices must have their own processor and memory hardware; SAN devices do not require these components. c. NAS devices must run their own operating system and typically provide a Web interface for administrative access; SAN devices do not have to have either one. d. NAS devices require a specialized protocol, such as Fibre Channel or iSCSI; SAN devices use standard networking protocols.

5. A security principal is a. The person granting permissions to network users. b.

Related Documents