Question

CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What...

CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total.

210.

What is the PowerShell command to get the PowerShell version on Server 2016?

Select one:

a. Get-Version

b. Get-PSVersion

c. Get-Host

d. Get-HostVersion

211.

Server 2016 supports volume size up to _____ for storage replication.

Select one:

a. 256GB

b. 64TB

c. 128TB

d. 1 PB

212.

Which of these commands is used to get Windows OS information using Powershell?

Select one:

a. Get-SystemInfo

b. All of the listed options.

c. [System.Environment]::OSVersion

d. Get-OSVersion

213.

Which of these match best for Synthetic Hardware in Server 2016?

Select one:

a. Synthetic Hardware uses the VMBus to send requests from the virtual machine device to the physical device. You need to install Integration Services for the VM’s where you want to use Synthetic Hardware.

b. All the virtual machine components are synthetic hardware’s.

c. Synthetic Hardware is hardware that is present in host machine but can we used in virtual machines as they are there.

d. Software drivers those replaces physical hardware in modern computers are called synthetic hardware. Ex. On screen keyboard.

214.

Which of the following statement is true about Shared VHDX in Hyper-V?

Select one:

a. It is a group storage feature that is used to host company and team shares within Office online environment.

b. Shared VHDX is a technology within hyper V that facilitate hosting of multiple application in same storage box attached to Hyper V.

c. Shared VHDX is shared storage box in Hyper V. This feature is useful when multiple hosts are running an application that shares same data. Shared VHDX can be mounted in multiple hosts to perform parallel Read/Write operation from multiple sessions.

d. Shared VHDX is used where multiple VMs are sharing a storage space and form a guest cluster to provide high availability inside the VM. This results in clustering within the VM to detect the storage failure and take recovery action.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

210.

Ans: c. Get-Host

211.

Ans: b. 64TB

Prior to Windows Server 2016, volumes had to specifically sized for the expected churn, with volume sizes above 10 TB not being good candidates for deduplication. In Windows Server 2016, Data Deduplication supports volume sizes up to 64 TB.

212.

Ans: c. [System.Environment]::OSVersion

213.

Ans: d. Software drivers those replaces physical hardware in modern computers are called synthetic hardware. Ex. On screen keyboard.

Synthetic devices are high performance software components that control access to physical hardware devices that are designed for optimal performance in virtualized environments.

214.

Ans: d. Shared VHDX is used where multiple VMs are sharing a storage space and form a guest cluster to provide high availability inside the VM. This results in clustering within the VM to detect the storage failure and take recovery action.

One of the really great things that can be done with Hyper-V guest operating systems is Guest Clustering.

Guest Clustering allows an application running on top of a hypervisor environment to have resiliency not only from a virtual machine level but also from an application standpoint. Guest Clustering means that you are running a cluster of virtual machines inside the hypervisor itself. If one of the VMs goes down the application availability is maintained by the guest clustered virtual machine. There is a new feature that was introduced with Windows Server 2012 R2 called Shared VHDX that greatly reduces the complexity of creating the shared virtual disks needed for guest clusters. The functionality of Shared VHDX was improved in Windows Server 2016 and a new feature was added called VHD Sets.

Add a comment
Know the answer?
Add Answer to:
CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 143. Which...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 143. Which of the following generation virtual machines can be created in Microsoft Hyper-V? (Choose 2) Select one or more: a. Generation 2 b. Generation 4 c. Generation 3 d. Generation 1 144. Which of the following details of IP address can a DHCP server provide? Select one: a. All of the listed options. b. Automatic allocation c. Dynamic allocation d. Static allocation 145. DHCP uses...

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions)...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Question 58 + 66-70 (6 Questions) Question 58. Which among the following are the best practices for enhancing Disk FT? Select one or more: a. Verify hardware and firmware components b. Retain some un-allocated space c. Replace failed disk immediately d. Design complete FT storage pool Question 66. What are Group Policy Objects? Select one: a. Collection of settings that define what a system will look like and how it...

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 234. Identify...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 234. Identify the correct hierarchy in which group policy take effect. Select one: a. 1) Sub OU Policy (If any are there) 2) OU Policy 3) Domain Policy 4) Site Policy 5) Local Policy b.    1) Local Policy 2) Site Policy 3) Domain Policy 4) OU Policy 5) Sub OU Policy (If any are there) c.    1) Domain Policy 2) Site policy 3) Local...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT