Chapter 20 Test/Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

In order to ensure that a Mac has no startup items, what two directories should you check for items?

/System/Library/StartupItems . /Library/StartupItems

On Linux, where are the commands required for system administration stored?

/sbin

How much drive space should be available for each virtual machine on a system?

20GB

IF you need to redirect the output for a command, what symbol should you use

>

Linux utilizes what two different wildcard characters at the command line?

? and *

What is the name of the OS X built-in backup utility?

Time Machine

The Android OS for mobile devices is based on Linux.

True

Swiping up with three fingers on Mac OS X launches what?

mission control

What user account is known as the system administrator or super user account?

root

What type of virtualization should you deploy to provide a Virtual Desktop Infrastructure?

server side

What terms are used to describe a machine that does not have an operating system and merely provides an interface between the user and the server? (Choose all that apply.)

zero client and dumb terminal, ultra thin client

Define a Type 1 hypervisor and give two examples of a Type 1 hypervisor.

A Type 1 hypervisor installs on a computer before any operating system, and is, therefore, called a bare-metal hypervisor. After it installs, it partitions the hardware computing power into multiple VMs. An OS is installed in each VM. Examples of Type 1 hypervisors are XenServer by Citrix, ESXi by VMware, and Hyper-V by Microsoft.

uestion 10 What statement regarding Type 1 hypervisors is accurate? a. They install as an application b. The VirtualBox software is an example c. They are called bare-metal hypervisors d. They are typically used on desktops and laptops

Correctc. They are called bare-metal hypervisors

LILO is the most commonly installed boot loader by the Linux operating system.

False

On Linux, the root user's home directory is /home/root.

False

What Linux distribution is considered a cutting-edge distribution?

Fedora

List three methods for keeping a virtual machine secured.

For a Windows VM, be sure to configure Windows Firewall in the VM, keep Windows updates current, install and run antivirus software, require passwords for all user accounts in the VM, and encrypt data folders. One major advantage of using VMs on a desktop computer is that VMs running under a Type 1 hypervisor are isolated from each other. If one VM gets infected, the other VMs will not be affected. You can move a VM from one computer to another by moving the files that contain the VM. Be sure these files that hold the VM are secured with permissions that allow access only to specific local or network users. Protect your VMs by applying security measures to protect the host computer that holds the VMs. For example, require password authentication to sign in to the host computer.

Explain what a thin client is, and detail when it might be used.

If a client does little or no processing with server-side virtualization, a thin client can be used. A thin client is a computer that has an operating system, but has little computing power and might only need to support a browser used to communicate with the server. The main advantage of using thin clients is the reduced cost of the client machine. A decent tablet can serve as a thin client.

What is the terminal in Linux?

In Linux, the terminal refers to the command-line interface for the OS and the default shell for the terminal is the Bash shell. The name stands for "Bourne Again Shell" and takes the best features from two previous shells, the Bourne and the Korn shells. In Linux, a command prompt in the terminal is called a shell prompt.

What is a typical use of a Type 2 hypervisor? (Choose all that apply.) a. for VDI deployment b. as honeypots to lure hackers c. cloud computing d. by developers to test applications

by developers to test applications and as honeypots to lure hackers

What command lets you view the contents of a file?

cat

In order to break out of a command or process on a terminal, what keys should you press?

ctrl + c

Programs on Mac that launch at startup are called login items.

false


Conjuntos de estudio relacionados

Chemistry H Section 6.5 Study Guide

View Set

History of architecture Exam 2: reading questions Islamic Architecture

View Set

Music of the African Diaspora (MUSC 1180) Final

View Set

Macroeconomics Final Exam Chapters 5 and 13-15

View Set

Microeconomics Quiz 2 Study Guide

View Set

Marketing Cloud Administrator - 1

View Set