What is the default TCP port for iSCSI? A. 3260 B. 1433 C. 21 D. 3389
You have a Windows Server 2022 Hyper- V host named Jupiter. You want to deploy several shielded virtual machines on Jupiter. You deploy a Host Guardian on a new server. You need to view the process of the shielded virtual machines installation. What should you run to see the progress of the shielded VM? A. Get- ShieldedVMProvisioningStatus cmdlet B. Diskpart command C. Set- VHD cmdlet D. Set- VM cmdlet
You are the administrator of a mid- sized network. You have a Hyper- V host that runs Windows Server 2022. The host contains a virtual machine named Virtual1. Virtual1 has resource metering enabled. You need to use resource metering to track the amount of network traffic that Virtual1 sends to the 10.10.16.0/20 network. Which cmdlet would you run? A. Add- VMNetworkAdapteiAd B. Set- VMNetworkAdapter C. New- VMResourcePool D. Set- VMNetworkAdapterRoutingDomamMapping
You are the administrator for an organization that has started using Hyper- V. You have a Hyper- V host named Server1 that runs Windows Server 2022. Server1 contains a virtual machine named Earth. You need to make sure that you can use nested virtualization on Earth. What should you run on Server1? A. Mount- VHD cmdlet B. Diskpart command C. Set- VMProcessor cmdlet D. Set- VM cmdlet
You need to ensure that VM1 and VM2 can communicate with each other only. The solution must prevent VM1 and VM2 from communicating with Server1. Which cmdlet should you use? A. Set- NetNeighbor B. Remove- VMSwitchTeamMember C. Set- VMSwitch D. Enable- VMSwitchExtension
You are the admin for a mid- sized company. You have a Hyper- V host named Server1 that runs Windows Server 2022. Server1 has a dynamically expanding virtual hard disk (VHD) file that is 950 GB. The VHD currently contains around 450 GB of free space. You want to reduce the amount of disk space used by the VHD. What command should you run? A. Mount- VHD cmdlet B. Diskpart command C. Set- VHD cmdlet D. Optimize- VHD cmdlet
You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1? A. Find- ServerPackage B. Get- Package C. Find- Package D. Get- WindowsOptionalFeature
You are working on a Windows Server 2022 Datacenter Server system. You need to view which roles and services are installed on the machine. Which PowerShell cmdlet can you use to see this? A. Get- event B. New- event C. Trace- command D. Get- WindowsFeature
What command would be used to register an iSCSI initiator manually to an iSNS server? A. iscsicli refreshisnsserver server_name B. iscsicli listisnsservers server_name C. iscsicli removeisnsserver server_name D. iscsicli addisnsserver server_name
You are an administrator who has set up two Hyper- V servers named Server1 (Windows Server 2022) and Server2 (Windows Server 2012 R2). Each Hyper- V server has multiple network cards. Each network card is connected to a different TCP/IP subnet. Server1 contains a dedicated migration network. Server2 contains a virtual machine named VM1. You plan to perform a live migration of VM1 to Server1. You need to ensure that Server1 uses all of the available networks to perform the live migration of VM1. What should you run to complete this task? A. Mount- VHD cmdlet B. Diskpart command C. Set- VHD cmdlet D. Set- VMHost cmdlet
Your company has decided to implement a Windows 2022 server. The company IT manager before you always used FAT32 as the system partition. Your company wants to know whether it should move to NTFS. Which of the following are some advantages of NTFS? (Choose all that apply.) A. Security B. Quotas C. Compression D. Encryption
You are the administrator of your network, which consists of two Windows Server 2022 systems. One of the servers is a domain controller, and the other server is a file server for data storage. The hard drive of the file server is starting to fill up. You do not have the ability to install another hard drive, so you decide to limit the amount of space everyone gets on the hard drive. What do you need to implement to solve your problem? A. Disk spacing B. Disk quotas C. Disk hardening D. Disk limitations
A system administrator is trying to determine which filesystem to use for a server that will become a Windows Server 2022 file server and domain controller. The company has the following requirements: ■ The filesystem must allow for file- level security from within Windows 2022 Server. ■ The filesystem must make efficient use of space on large partitions. ■ The domain controller SYSVOL must be stored on the partition. Which of the following filesystems meets these requirements? A. FAT B. FAT32 C. HPFS D. NTFS
You are an IT administrator who manages an environment that runs multiple Windows Server 2022 servers from multiple site locations across the United States. Your Windows Server 2022 machines use iSCSI storage. Other administrators report it is difficult to locate available iSCSI resources on the network. You need to make sure other administrators can easily access iSCSI resources using a centralized repository. What feature should you deploy? A. The iSCSI Target Storage Provider feature B. The Windows Standards- Based Storage Management feature C. The iSCSI Target Server role feature D. The iSNS Server service feature
You are the IT manager for your company. You have been asked to give the Admin group the rights to read, change, and assign permissions to documents in the StormWind Documents folder. The following table shows the current permissions on the StormWind Documents shared folder: Group/User NTFS Shared Sales Read Change Marketing Modify Change R&D Deny Full Control Finance Read Read Admin Change Change What do you need to do to give the Admin group the rights to do their job? (Choose all that apply.) A. Give Sales Full Control to shared permissions. B. Give Full Control to NTFS security. C. Give Admin Full Control to shared permissions. D. Give Finance Modify to NTFS security. E. Give Admin Full Control to NTFS security.
Will, the IT manager for your company, has been asked to give Moe the rights to read and change documents in the StormWind Documents folder. The following table shows the current permissions on the shared folder: Group/User NTFS Shared Sales Read Change Marketing Modify Change R&D Deny Full Control Finance Read Read Tylor Read Change Moe is a member of the Sales and Finance groups. When Moe accesses the StormWind Documents folder, he can read all the files, but the system won’t let him change or delete files. What does Will need to do to give Moe the minimum amount of rights to do his job? A. Give Sales Full Control to shared permissions. B. Give Moe Full Control to NTFS security. C. Give Finance Change to shared permissions. D. Give Finance Modify to NTFS security. E. Give Moe Modify to NTFS security.
For security reasons, you have decided that you must convert the system partition on your removable drive from the FAT32 filesystem to NTFS. Which of the following steps must you take in order to convert the filesystem? (Choose two.) A. Run the command CONVERT /FS:NTFS from the command prompt. B. Rerun Windows Server 2022 Setup, and choose to convert the partition to NTFS during the reinstallation. C. Boot Windows Server 2022 Setup from the installation CD-R OM, and choose Rebuild File System. D. Reboot the computer.
You are the administrator of your network, which consists of two Windows Server 2022 systems. One of the servers is a domain controller, and the other server is a file server for data storage. The hard drive of the file server is starting to fill up. You do not have the ability to install another hard drive, so you decide to shrink the data on the file server. What do you need to implement to solve your problem? A. Disk spacing B. Disk compression C. Disk hardening D. Disk limitations
You are the administrator of a large organization. Four weeks ago you have built a new Windows Server 2022 Datacenter Server. You can’t remember all of the roles and features that you previously installed. You need to view which roles and features are installed on the machine. Which PowerShell cmdlet can you use to see this? A. Get- event B. New- event C. Trace- command D. Get- WindowsFeature
What is the default TCP port for RDP? A. 3260 B. 1433 C. 21 D. 3389
As stated throughout this book, PowerShell is a command- line shell and scripting tool. BranchCache has many different PowerShell cmdlets that allow you to configure and maintain the BranchCache feature. Table 11.5 shows just some of the different PowerShell cmdlets for BranchCache.
TABLE 11.5 PowerShell cmdlets for BranchCache
Add- BCDataCacheExtension
Increases the amount of cache storage space that is available on a hosted cache server by adding a new cache file
Clear- BCCache
Deletes all data in all data and hash files
Disable- BC
Disables the BranchCache service
Disable- BCDowngrading
Disables downgrading so that client computers that are running Windows 10 do not request Windows 7/8 specific versions of content information from content servers
Enable- BCDistributed
Enables BranchCache and configures a computer to operate in distributed cache mode
Enable- BCHostedClient
Configures BranchCache to operate in hosted cache client mode
Enable- BCHostedServer
Configures BranchCache to operate in hosted cache server mode
Enable- BCLocal
Enables the BranchCache service in local caching mode
Export- BCCachePackage
Exports a cache package
Export- BCSecretKey
Exports a secret key to a file
Get- BCClientConfiguration Gets the current BranchCache client computer settings Get- BCContentServer Gets the current BranchCache content server settings Configuration Get- BCDataCache Gets the BranchCache data cache Get- BCStatus Gets a set of objects that provide BranchCache status and configuration information Import- BCCachePackage Imports a cache package into BranchCache Import- BCSecretKey Imports the cryptographic key that BranchCache uses for generating segment secrets Set- BCAuthentication Specifies the BranchCache computer authentication mode
Cmdlet
Description
Set- BCCache
Modifies the cache file configuration
Set- BCSecretKey
Sets the cryptographic key used in the generation of segment secrets
Enhanced Features in Windows Server 2022 BranchCache
Microsoft continues to improve on many of the features of Windows Server, and BranchCache is no different. Microsoft has improved BranchCache in Windows Server 2022 and Windows 10/11. The following list includes some of the enhanced features:
Office sizes and the number of branch offices are not limited. Windows Server 2022 BranchCache allows any number of offices along with any number of users once you deploy hosted cache mode with multiple hosted cache servers.
There are no requirements for a Group Policy Object (GPO) for each office location, streamlining deployment. All that is required to deploy BranchCache is a single GPO that contains a small number of settings.
Client computer configuration is easy. You have the ability to configure their clients through the use of a GPO. If this is done, client configuration will automatically be configured through the GPO, and if a client can’t find a hosted cache server, the client will automatically self- configure as a hosted cache mode client.
BranchCache is deeply integrated with the Windows file server. BranchCache is automatically integrated with Windows file server technology. Because of this, the process of finding duplicate pieces in independent files is greatly improved.
Duplicate content is stored and downloaded only once. BranchCache stores only one instance of the content on a hosted cache server or content server, and because of this, you get greater disk storage savings. Since client computers at the remote offices download only one instance of any content, your network saves on additional WAN bandwidth.
Small changes to large files produce bandwidth savings. One advantage of BranchCache is the file server chunking system that helps divide files and web pages into smaller parts. Now when a file is changed, only the part of that file that has been changed gets replicated. This allows BranchCache to use lower bandwidth requirements.
Offline content creation improves performance. When BranchCache is deployed as content or file servers, the data is calculated offline before a client even has the chance to request it. Because of this, the systems get faster performance and bandwidth.
Cache encryption is enabled automatically. BranchCache stores its cached data as encrypted data. This guarantees data security without the need to encrypt the entire drive.
Summary
In this chapter, I discussed file servers and how they can be effective on your network. I also discussed sharing folders for users to access, and then I discussed how to publish those shared folders to Active Directory.
You learned about NTFS security versus shared folder permissions and how to limit users’ hard drive space by setting up disk quotas. The chapter also covered the Encrypting File System (EFS) and how users can encrypt and compress files.
I also discussed how configuring file and storage solutions can be highly effective within your organization. You now have a better understanding of how Windows Server 2022 can provide you with extended functionality for effectively controlling corporate data.
I talked about Data Deduplication and how it can help protect your corporate data and also provide a backup solution.
This chapter took you through the use of many server tools and utilities such as DFS and encryption. Distributed File System allows you to set up a tree structure of virtual directories that lets users connect to a shared folder anywhere throughout the entire network.
You also learned about EFS and how to use Cipher to modify or configure EFS in a command window. Cipher is the best way to change encrypted directories and files.
Exam Essentials
Know storage technologies. Understand how to use the Fibre Channel, iSCSI, and NAS storage technologies. Know how to configure an iSCSI initiator and how to establish a connection to a target. Practice configuring tiered storage and using thin provisioning and trim.
Know how to configure NTFS security. One of the major advantages of using NTFS over FAT32 is access to additional security features. NTFS allows you to put security at the file and folder layers. NTFS security is in effect whether the user is remote or local to the computer with the data.
Know how to configure shared permissions. Shared permissions allow you to determine the access a user will receive when connecting to a shared folder. Shared permissions are allowed only at the folder layer and are in effect only when the user is remote to the computer with the shared data.
Understand how NTFS and shared permissions work together. NTFS and shared permissions are individually additive— you get the highest level of security and permissions within each type. NTFS is always in effect, and it is the only security available locally. Shared permissions are in effect only when connecting remotely to access the shared data. When the two types of permissions meet, the most restrictive set of permissions applies.
Exam Essentials
Know how to configure disk quotas. Disk quotas allow an organization to determine the amount of disk space that users can have on a volume of a server. You can set up disk quotas based on volumes or by users. Each volume must have its own separate set of disk quotas.
Understand data deduplication. Know that data deduplication involves finding and removing duplicate data within the company network without compromising its integrity. Understand that the goal is to store more data in less space by segmenting files into small chunks, identifying duplicate chunks, and maintaining a single copy of each chunk.
Know how to configure DFS. Distributed File System in Windows Server 2022 offers a simplified way for users to access geographically dispersed files. The DFS Namespace service allows you to set up a tree structure of virtual directories that lets users connect to shared folders throughout the entire network.
Understand EFS and Cipher. Users can encrypt their directories and files by using EFS. Understand how Cipher can help you configure or modify an EFS object while in the command prompt.