Study Guide SP-2022
"What character does a Linux system normally use to show that the shell access has changed from standard user access to root, or superuser, access?"
#
Information security management happens in what activities of the service value chain?
-Information security is monitored during service delivery in the Deliver and Support activity. -Information security is introduced during design processes of the Design and Transition activity.
What Linux system directory contains program files?
/usr
"A specification used by software components to communicate with each other and that may describe the ways in which a particular task is performed." defines _______________.
API
Which of the following is a way to acquire business software that meets the needs of the business?
All of these are ways.
There are two required options for every map: (i)_______________ and (ii)_____________
Center, Zoom
A web service is normally a web site or web page as well.
FALSE
In an exercise, you created a PHP Web service and deployed it to a Glassfish server, and then you wrote code to consume it.
FALSE
A Linux system can have only one primary partition
False
ITIL is the only existing set of IT service management guidelines.
False
Which of the following is not a component of the service value system as it is conceptualized by ITIL?
Four Dimensions
Write a brief paragraph (3-5 sentences) and describe what is system integration?
If you were to technically describe what system integration is, it would simply be the process of linking together different computing systems or software applications so that they act as a coordinated whole. As a systems integrator your job is to create a stable method for bringing together these different computing systems using processes such as computer networking or programming. Their goal is to ultimately bring together many of these different computing software and system programs physically and functionality, so that they can work as a complete system rather than many different subsystems. By bringing together many different subsystems, SI integrators can achieve an unlimited amount of processing capabilities under one system.
To apply the learnings, which of the following is NOT a recommended step for doing so?
Improvement efforts involve the service provider staff, but not the customers, because knowledge of the customer experience has already been gathered before improvements begin.
What terminal emulation package is designed to work specifically in the KDE desktop environment?
Konsole
"The pipes between servers involved in delivering an application with data" describes _______________.
Middleware
In distributed computing, distributed objects are, basically, software components.
TRUE
Single sourcing and multisourcing are special cases of outsourcing.
TRUE
Suppose you are developing a Java desktop application that will consume a web service written in PHP. Which of the following statements is true?
The Web server that hosts the web service must have PHP installed and enabled.
"In Linux, hidden files do not appear in a normal listing (using the ls command) and are not displayed when using a graphical file manager tool"
True
Linux files aren't required to use a file extension
True
Which IT service management dimension focuses on efficiency and eliminating waste?
Value streams & processes
Based on the location you see for Ralph.txt, would you say there is a web server running in the VM with this directory tree?
Yes, there could be a web server running, or no, the Apache software could just be installed but the server not started. There is no way to tell for certain by just looking at a directory tree.
In the exercises where you consumed and/or created a web service, the service description ovals in the diagram correspond to which of the following?
a file with the .wsdl extension
Consuming a SOAP-based web service in PHP utilizes ____________________.
additional PHP libraries beyond a standard Apache installation of PHP
Write a command to view but not edit the contents of the file Anon.dat from your current working directory.
cat Pictures/Hide_n_Seek/Anon.dat
Write a command to change your working directory to the one that contains the file Anon.dat.
cd Pictures/Hide_n_Seek
Which one of the following Linux distributions is derived from Red Hat Enterprise Linux (RHEL)?
centos
Write a command to copy Ralph.txt to the same directory it's in but rename it with a .html extension rather than the .txt extention.
cp /srv/www/htdocs/Ralph.txt /srv/www/htdocs/Ralph.html
Write a command to copy the file with no extension from its current location to the subdirectory Pictures. Have the copy command rename the copied file with the same filename but with an extension of xyz.
cp Isaac Pictures/Isaac.xyz
"When the kernel wishes to access a memory page and the page is not located in physical memory, where does it go to retrieve the page?"
disk
The first disk in a Linux system is designated as sda1 and the first partition is sda.
false
Write the address of the file as it appears the url locator text box of Firefox. Type a space and then write either Y or N to answer the question, "Is the file being served by a web server?"
file:///srv/www/htdocs/Ralph.html N
"You are developing a new Web application that will be used heavily by Linux users. What Web browser is it most important that you test for compatibility with your application, based upon the number of users of each browser?"
firefox
Which of the following are ITIL practices categorized as service management practices?
incident and availability management
Which one of the following processes must start first on a Linux system?
init
What command allows administrators to manually send messages to syslog?
logger
Write a command that displays the files and subdirectories of your user's home folder, including file sizes and some other information (as opposed to just file and directory names).
ls -l
Nancy is trying to install modules on a Linux system using the insmod command but consistently runs into issues with module dependencies. What tool can she use instead that will resolve dependencies for her?
modprobe
To achieve benefits from continual service improvement efforts, it is necessary to ensure that _______________ and reporting of performance is done.
monitoring
Which one of the following is NOT a primary task of the Linux kernel?
network address allocation
"What office productivity software includes the Writer, Calc, Impress, Draw, Math, and Base applications?"
openoffice.org
Elements of Value
perception, preference
Which one of the following partitions would not be bootable on a Linux system?
sda4
You need to securely transfer files between two Linux systems. What command is most appropriate for this requirement?
ssh
Which one of the following protocols should never be used for remote system administration because of security issues?
telnet
Write a command to update the last used date of the file Bear.txt without opening the file for viewing.
touch /lost+found/Bear.txt
"Relative filepaths allow you to specify a destination directory relative to your current location, without having to start at the root"
true
"The Network File System (NFS) can emulate a Microsoft Windows server environment on a Linux server, including the Active Directory authentication system."
true
"The su Linux command allows you to change from the user account that you are logged in as to any other user account on the system, including the root user account"
true
"The sudo command allows you to run individual commands as the root user account, essentially granting you temporary use of the account's privileges"
true
"When you start a new shell prompt in Linux, the session starts in the current user's home directory"
true
The purpose of the power-on self-test (POST) is to perform a check of system hardware during the Linux boot process.
true
The __________ plays their part in providing valuable feedback on the IT service and, thereby, they help in shaping the service.
user
Write a command to open in vim the file named Janet.log from your current working directory using the relative path to the file.
vim Documents/Janet.log
Write a command to open in vim the file with a .txt extension that is in your home directory.
vim Pablo.txt
You are keeping a running history of the users logged into a system with input generated by the who command. You would like to run a command every five minutes that appends the output to a file named user_history. What command should you use?
who >> user_history