Google IT Support Professional Certificate: System Administration and IT Infrastructure Services, week 4.0
What would you use if you wanted to set a default wallpaper background for all machines in your company, but still wanted users to be able to set their own wallpaper?
A preference
What is reverting to a previous state called?
A rollback
In Active Directory, a Domain Controller functions as which of the following? Check all that apply.
A server that holds a replica of the Active Directory database, A DNS Server, A Kerberos authentication server
What roles does a directory server play in centralized management? Check all that apply.
Accounting, Authorization, Centralized Authentication
What should you avoid using for tasks that don't require it?
Administrator rights
Updating your servers once every month or so with the latest security patches
Batch update
How are things organized in a directory server?
By a hierarchical model of objects and containers
What are two drawbacks to cloud storage?
Cost and Dependency
A facility that stores hundreds, if not thousands, of servers
Data Center
What two factors make it more important to keep servers functioning?
Dependent users and importance in the company
Hardware lifecycle stage where hardware is set up so that an employee can do their job
Deployment
What is the second hardware lifecycle stage?
Deployment
Which component of an LDAP entry contains the unique entry name?
Distinguished name
Which of the benefits below make using an Infrastructure as a Service (IaaS) provider a better option than purchasing dedicated physical hardware? Check all that apply.
Having low initial costs Not needing to manage physical servers Using a server for a short amount of time
Which might have an IT infrastructure run by a single person?
Hometown Independent Computer Company, LLC; In smaller companies, it's usually a single person who manages an entire company's IT infrastructure.
What encompasses the software, hardware, network, and services required for an organization to operate in an enterprise IT environment?
IT infrastructure
What does IaaS stand for?
Infrastructure as a Service
What service allows a company to pay for virtual machines which can be run as servers through the cloud? Popular options include Amazon EC2, Linode, Windows Azure, and Google Compute Engine
Infrastructure as a Service
The following is a common policy question: Should users be allowed to view non-work-related websites, like Facebook?
It depends (Company preference)
In order to authenticate user accounts against AD, what must be done to the computer first?
Join it to the domain
What can be connected to multiple computers, and allows someone to use those computers with one keyboard, one mouse, and one monitor?
KVM switch
What does KVM stand for?
Keyboard Video Mouse
What is the main advantage of using DHCP?
Leases IP addresses, removing the need to manually assign addresses
Hardware lifecycle stage where software is updated and hardware issues are fixed if and when they occur
Maintenance
What is the third hardware lifecycle stage?
Maintenance
Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?
NTP
Which of the following is not a network file transfer protocol?
NTP
What does NaaS stand for?
Networking as a Service
What service takes care of both networking hardware and setting up a network (or networks) for a company?
Networking as a Service
An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?
PaaS (Platform as a Service)
What does PXE Boot stand for?
Pre boot execution
Which is not a component of a KVM switch? monitor mouse keyboard printer
Printer; Printing services are compatible with but irrelevant to KVM switches!
The following is common policy question with a generally agreed upon answer: Should users have complex passwords with certain requirements?
Probably
The following is common policy question with a generally agreed upon answer: Should users be allowed to install software?
Probably not
Hardware lifecycle stage where hardware is purchased or reused for any employee
Procurement
What is the first hardware lifecycle stage?
Procurement
In an infrastructure context, it is the parts of the infrastructure where a certain service is executed and served to its users
Production
In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from a Windows machine? Check all that apply.
PuTTY WinRM
Creating a roadmap to retrace the steps that led the user to an unexpected outcome; reproducing an error to be able to test solutions
Reproduction case
Hardware lifecycle stage where hardware becomes unusable or no longer needed and it needs to be properly removed from the fleet
Retirement
What is the fourth hardware lifecycle stage?
Retirement
Instead of assigning access for each user account individually, ________ is a more efficient and easier-to-manage approach.
Role-Based Access Control (RBAC)
If you wanted to securely transfer files from your local machine to a web server, what file transfer protocol could you use?
SFTP
A client discovers the address of a domain controller by making a DNS query for which record?
SRV record
Which of the following options allow you to access a computer remotely? Check all that apply.
SSH VPN
Software or a machine that provides services to other software or machines
Server
Let's say that you're the sole IT person at your company. The company is a very small startup, and they need to set up a few non-critical services and have a single physical server in place. What's the best approach to fully utilize this server?
Set up virtualized servers on the server
What are the three ways to authenticate to an LDAP server?
Simple bind, Anonymous bind, SASL
When there are conflicting GPOs, what's the order in which they're evaluated and applied?
Site, Domain, OU
Windows command to record a group of commands as they're being issued along with their output
Start-Transcript
Adding and removing users when they join or leave a company, as well as provisioning users with working machines and software, is the responsibility of who?
Sysadmins
A sysadmin is looking to use Pre Booth Execution over a network by keeping operating system installation files on a server. Which type of server is this most likely to be?
TFTP server
A virtual machine running the same configuration as the production environment, but isn't actually serving any users of the service
Test environment
What are the three most common server form factors?
Tower, Rack, and Blade
A website is inaccesible via its URL. You've pinged the site and see no problem there. What is the next troubleshooting step?
Use nslookup in the terminal to rule out DNS issues
The following is common policy question with a generally agreed upon answer: If you hand out a company phone to an employee, should you set a device password?
Yes
What are the advantages of using Infrastructure as a Service (or IaaS) solutions? Check all that apply.
You can have the hardware you need without upgrading any actual hardware You're not responsible for managing hardware tasks Operating system updates are taken care of for you
When you make a DNS query, where does your computer first check to find an IP address to name mapping?
Your local machine
Which of these is considered a server? Check all that apply.
a computer that provides a service to other computers; Servers are essentially software or computers that provide a service to other software or computers. a software that provides a service to other software software that provides a service to other machines
Which of the following is a good policy to enforce on passwords? Check all that apply.
a long password length; Passwords are one of the first and biggest security policies that help prevent unauthorized access. A good policy for passwords is to make them long and with a mixture of symbols, numbers, uppercase, and lowercase characters. a mixture of symbols and numbers
As sysadmin, you will have to prioritize issues. Which of these issues would be a top priority?
a server stopped providing service to 100 users.
Which of these are part of the five primary elements that make up a post-mortem report? Check all that apply.
a summary a timeline resolution and recovery steps a root cause description recommend future action items
Which of the following can be a responsibility of a systems administrator? setting up new user accounts and machines maintaining servers troubleshooting user issues all of the above
all of the above; A systems administrator has a wide range of responsibilities; this can include, but is not limited to, setting up new user accounts and machines; maintaining servers; and troubleshooting user issues.
Which of these are common responsibilities of systems administrators? constantly troubleshoot problems, such as network issues all of the above work in the background to make sure a company's IT infrastructure is always working help users with issues, such as lost passwords and logon problems
all of the above; Employees need computers along with proper software to be productive! Fun fact: up to 25% of people forget their password at least once a day!
Which of the following make up IT infrastructure? hardware and software network operating systems all of the above
all of the above; IT infrastructure encompasses the software, hardware, network, operating systems, and other services required for an organization to operate in an enterprise IT environment.
Which of these are common backup tools you might consider when designing a backup solution? Check all that apply.
backup and restore rsync time machine
Budget constraints aside, what is the ideal backup solution?
both
What options are available for storing backups, physically?
both
Which of these are components of a post-mortem report? Check all that apply.
brief summary detailed timeline of key events explaining of solution and recovery effort
With _______, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection.
cloud computing; The cloud is a network of servers that store and process our data. We refer to the concept of cloud computing as a way to do our daily computer job functions from anywhere, as long as we have an Internet connection.
A disaster recovery plan is a collection of documented procedures and plans on how to react and handle an emergency or disaster scenario from an operational perspective. What are important elements of a disaster recovery plan? Check all that apply.
corrective and recovery measure preventative measure detection measure
Which of these terms describe a facility that stores hundreds, if not thousands, of servers?
data center; Companies with large amounts of data have to keep their information stored in places like data centers. A data center is a facility that stores hundreds, if not thousands, of servers.
The IT department sets up a user account and software. Which stage of the hardware lifecycle does this situation belong to?
deployment; The deployment stage of the hardware lifecycle usually occurs when a machine is first set up, like in this example.
What types of backup schemes are available? Check all that apply.
full/differential/incremental
What's the purpose of a post-mortem report?
learn from mistakes
You're the sole IT employee at your company, and you don't know how many users or computers are in your organization. Uh oh! What can you use to easily manage the users in your company?
not Physical Infrasturucture Services, Platform Services
Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability?
not incremental
Which type of backup only saves copies of files that have been changed or created since the last backup?
not incremental differential backups
You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of preventative measures? Check all that apply.
operational doc alert sys for outages regular automated backups redudancy solutions
The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn't go smoothly. You decide to investigate. What is a commom term in the IT community for this investigation?
post mortem
What are the measures included in a disaster recovery plan?
preventative detection recovery
As a sysadmin, you will find yourself doing business with a variety of third-party vendors. Which of these are likely to be rented or bought from a vendor? Check all that apply.
printers; Sysadmins might be responsible for making sure printers are working, or if renting a commercial printer, they have to make sure that the vendor can be on-site to fix it. fax machines video or audio conferencing machines
An IT department uses a pre-used laptop out of their hardware inventory for a new user. Which stage of the hardware lifecycle does this scenario belong to?
procurement; The procurement stage of the hardware lifecycle can include situations where pre-used machines are reused for a new user.
A company has a "bring your own device" (BYOD) policy for computers; anyone can just go out and buy whatever computer they want. Which stage of the hardware lifecycle does this scenario belong to?
procurement; When an employee obtains access to hardware, this falls into the procurement stage of the hardware lifecycle.
What are advantages of on-site backups? Check all that apply.
quicker data access less bandwidth usage data is more secure because less outbound traffic
Which of these server hardware can you stack on top of each other in a server rack?
rack; A rack and a blade server lay flat and can be stacked on top of each other when you mount them on a server rack. blade
Linux tool which can be used to record an interaction with a graphical application
recordMyDesktop
You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of corrective or recovery measures? Check all that apply.
restoring data from backup hardware repair and replacement rebuilding and re configuring services
Which of these is part of the hardware lifecycle? Check all that apply
retirement procurement deployment; The hardware lifecycle consists of four main stages: Procurement, Deployment, Maintenance, and Retirement.
The machine has to be returned to the vendor for proper recycling. Which stage of the hardware lifecycle does this scenario belong to?
retirement; The retirement stage of the hardware cycle can include situations where a vendor recycles the machines.
Cloud services are the ideal backup option for user files. Which of these is not one of today's popular cloud storage platforms?
rsync
Linux command to record a group of commands as they're being issued along with their output
script
What are the benefits of cloud computing over local computing? Check all that apply. services are accessible from anywhere in the world there are potential long-term costs associated with cloud computing there are smaller starting costs for cloud computing software updates are handled by the company providing the service
services are accessible from anywhere in the world; Cloud computing has some great benefits, like smaller starting costs, services that are accessible anywhere in the world with an Internet connection, and software updates that are handled by another company. there are smaller starting costs for cloud computing You didn't select all the correct answers!
A KVM switch is used to:
switch between multiple computers using one monitor, keyboard, and mouse; A KVM switch is a device used to switch between multiple computers using one keyboard and video display, like a monitor and mouse. That's where the name "KVM" comes from!
How can you verify that your disaster recovery plan will be effective? Check all that apply.
through testing, through disacster simulation
Which type of server most closely resembles a desktop computer in appearance?
tower server; Server hardware can come in lots of different forms: they can be towers that sit upright and look very similar to the desktops we've seen
What are the benefits of local computing over cloud computing? Check all that apply.
updates can be handled at anytime; With local computing, you're in complete control of your IT infrastructure and can update and secure your organization at anytime. you have complete control of the IT infrastructure
What are some ways you can make your backups more space-efficient? Check all that apply.
use incremental backups use compression
You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of detection measures? Check all that apply.
using alert system for outages monitoring system testing testing your own and users knowledge and readiness for disasters
An employee is leaving your company. Which of these steps are appropriate to take during offboarding? Check all that apply.
wipe the machine for future use; If a user leaves the company, you'll also have to wipe the machine, so that you can eventually reallocate it to someone else. remove the user's access to IT resources