Podcast
Questions and Answers
What is a significant benefit of using both on-site and off-site backup methods?
What is a significant benefit of using both on-site and off-site backup methods?
Why are ordinary file copy backup methods typically not suitable for backing up databases?
Why are ordinary file copy backup methods typically not suitable for backing up databases?
What is a characteristic of Direct Attached Storage in a network environment?
What is a characteristic of Direct Attached Storage in a network environment?
What is the advantage of using a bare metal backup?
What is the advantage of using a bare metal backup?
Signup and view all the answers
Which of the following statements about Network Attached Storage (NAS) is incorrect?
Which of the following statements about Network Attached Storage (NAS) is incorrect?
Signup and view all the answers
In a peer-to-peer network, how do computers interact with each other regarding file sharing?
In a peer-to-peer network, how do computers interact with each other regarding file sharing?
Signup and view all the answers
Which Windows backup tool allows for automated backups as files are modified?
Which Windows backup tool allows for automated backups as files are modified?
Signup and view all the answers
How can a NAS appliance be accessed for configuration?
How can a NAS appliance be accessed for configuration?
Signup and view all the answers
What is one way an administrator can share a printer on a network?
What is one way an administrator can share a printer on a network?
Signup and view all the answers
What must be true for devices to access a locally installed printer?
What must be true for devices to access a locally installed printer?
Signup and view all the answers
In which scenarios can a Windows computer belong to a domain?
In which scenarios can a Windows computer belong to a domain?
Signup and view all the answers
What happens when a folder is shared on a Windows computer?
What happens when a folder is shared on a Windows computer?
Signup and view all the answers
What is required to allow unauthenticated access to shared resources on Windows?
What is required to allow unauthenticated access to shared resources on Windows?
Signup and view all the answers
Which method allows a user to quickly access and share files using Bluetooth on Windows 10?
Which method allows a user to quickly access and share files using Bluetooth on Windows 10?
Signup and view all the answers
How can someone access a specific shared folder on a network using its Universal Naming Convention (UNC)?
How can someone access a specific shared folder on a network using its Universal Naming Convention (UNC)?
Signup and view all the answers
What is a primary characteristic of cloud computing?
What is a primary characteristic of cloud computing?
Signup and view all the answers
Which of the following is not a benefit of using cloud storage?
Which of the following is not a benefit of using cloud storage?
Signup and view all the answers
Which of the following statements about P2P file sharing is false?
Which of the following statements about P2P file sharing is false?
Signup and view all the answers
What is a recommended practice regarding data backups?
What is a recommended practice regarding data backups?
Signup and view all the answers
What is one of the major risks associated with using P2P networks?
What is one of the major risks associated with using P2P networks?
Signup and view all the answers
Study Notes
Local Network Sharing and Storage
- A computer on a network can share its internal and external local drives.
- This is referred to as Direct Attached Storage, and the workstation acts as a file server.
- In a SOHO network, workstations function both as servers and clients, known as peer-to-peer.
- In an enterprise network, dedicated server computers manage server functions, including file sharing.
Network Attached Storage (NAS)
- A NAS appliance is a storage device with basic server firmware, usually running Linux.
- It provides access to its storage devices via file sharing protocols.
- NAS appliances can be configured using a web management page.
Network Printer Sharing
- Printers can be shared on a network by either sharing through Windows or using a hardware print server.
- Windows printer sharing requires both the printer and PC to be switched on.
- Hardware print servers allow clients to connect directly to the printer over the network.
Windows File Sharing
- Windows requires appropriate client software for network connectivity and resource sharing.
- Windows client software is installed by default, allowing computers to connect to workgroups or Active Directory domains.
- Workgroups and domains are mutually exclusive, and a computer can only belong to one domain.
File and Printer Sharing
- Any file or folder on a Windows computer can be shared, provided firewall settings allow it.
- Sharing an object involves granting access to specific users or groups with defined permission levels.
- For unauthenticated access, the Guest account can be enabled, or password-protected file sharing can be disabled, although these options are less secure.
Browsing Network Shares and Drives
- Shared folders on a host computer are visible on the network.
- Network resources can be accessed through the Network object in Explorer.
- Shared folders can be accessed by entering the UNC (Universal Naming Convention).
- Mapping a network drive allows for quicker access to shared folders.
Hosted Sharing and Storage
- Hosted storage solutions make resources available over a wider network, such as the internet.
HTTP/HTTPS and File Downloads
- HTTP allows hyperlinks to point to any type of file, enabling web servers to host file downloads.
File Transfer Protocol (FTP)
- FTP facilitates uploading and downloading files between clients and servers.
- FTP servers can have public and private directories, requiring either anonymous access or user authentication.
- FTP offers more efficiency compared to email attachments and HTTP file transfer.
- FTP can use encryption protocols for security.
Cloud Computing
- Cloud computing refers to computing resources delivered on a pay-per-use basis.
- The customer is not responsible for configuring or provisioning the resources.
- Cloud computing offers benefits like rapid elasticity, on-demand access, and pay-per-use services.
Cloud-based Storage
- Cloud-based storage solutions offer user-friendly access through browsers or apps.
- Services like Apple iCloud, Google Drive, and Microsoft OneDrive provide free storage options.
- Business-oriented solutions like DropBox and Amazon S3 offer more features and storage capacity.
Cloud-based Collaborative Applications
- Cloud-based office suites allow for collaboration on documents using web browsers.
- Suites like Microsoft Office 365, Google G Suite, and Smartsheet offer word processing, spreadsheets, presentations, and other collaboration tools.
Peer-to-Peer (P2P) File Sharing
- P2P Networks rely on clients contributing resources instead of a central server.
- Clients share storage space and bandwidth to search, download, and upload files.
- P2P networks are often used for sharing music and videos, but can pose risks like copyright infringement and malware.
Backups
- Backups are essential for protecting data from loss, theft, or damage.
- Key principles include off-site backup for disaster recovery, multiple backup copies for data recovery and security, and regular backup schedules.
Backup Storage Types
- Backup storage options include locally attached storage, network attached storage (NAS), and offsite/cloud-based solutions.
- Combining backup methods, such as local and cloud storage, offers a robust approach.
File Backups and Critical Data
- File backups involve selecting specific folders or files for backup based on a defined schedule.
- Critical data includes settings files, databases, and message stores that need to be backed up.
- Protecting critical data requires ensuring security policies and access controls are maintained for backups.
Database Backups
- Database backups require specialized software due to the constantly changing state of data.
- Database replication creates a copy on a separate server, ensuring data consistency in case of master database server failure.
- Transaction logs are vital for backing up databases, allowing for transaction rollback and recovery from critical disasters.
OS Backups
- OS backups create a copy of the operating system and installed applications for system recovery.
- Bare metal backups allow direct recovery of the system image onto a partitioned drive.
- System images are large files and can be time-consuming to create.
Windows Backup
- Windows offers backup and recovery options like Backup and Restore (Windows 7) and File History (Windows 8 and 10).
- File History is a feature that automatically backs up file changes as they occur.
Scheduling and Frequency
- Backup schedules and frequency depend on the type of data, volume, and time constraints.
- Enterprise networks often use tape-based backup due to large data volumes, while personal computers often use hard-disk based storage for faster and more frequent backups.
Backup Scheduling
- Backup jobs are often scheduled for overnight to minimize performance problems, especially when using cloud-based storage.
- Most businesses back up data at least once a day.
- Backups should be made before installing or upgrading software or hardware to ensure data recovery in case of issues.
- Backups should also be made before uninstalling software.
Backup Frequency and Storage
- Consider the frequency of backups based on how often data changes.
- Multiple backups allow for data recovery from different points in time in case of accidental file deletion or modification.
- Multiple drives are recommended for storing multiple backups, or sufficient space on a single drive.
Backup Verification and Testing
- Regularly testing backup operations is crucial to ensure data integrity.
- Backup software should have error detection and reporting capabilities to identify issues with backup media or configuration.
- Verify backups regularly to guarantee that critical data files are included.
- Test restore operations to ensure successful data recovery.
- Perform random spot checks to ensure all data is being backed up.
- Redirect test restore data to a different folder to avoid overwriting live data.
- Review backup status reports to confirm successful backup completion.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your understanding of local network sharing, including direct attached storage, network attached storage (NAS), and printer sharing. Explore how workstations act in peer-to-peer networks and the roles of dedicated servers in enterprise environments. This quiz covers essential concepts of file sharing protocols and management.