Other Operating Systems and Technologies

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have a MacBook running macOS Yosemite on your network. You want to create a backup of critical operating system files in case the system crashes and is unable to locate the hard drive. What should you create? A. Recovery disk B. Image C. Snapshot D. Time Machine

A. Mac OS X Yosemite has the ability to create a recovery disk using the Recovery Disk Assistant. This can be used to boot the system in the event of a hard drive problem and to attempt to recover the hard drive.

A user recently left the company, and you need to change ownership of his files on the Linux server to a new user. Which command should you use to do this? A. chown B. chmod C. chperm D. cp

A. The chown (change owner) command is used to change ownership of files in Linux.

You are configuring the Mail app on an iPhone to use an Outlook.com email address. What configuration information do you need to enter to establish connectivity? A. Email address and password B. Email address, password, and server name C. Email address, password, server name, and mail protocol D. Email address, password, server name or IP address, and mail protocol

A. When configuring a mobile email client to access a commercial email provider, you typically just need your username and password to establish connectivity. Examples include Google, Yahoo, Outlook.com, and iCloud.

Which two commands are used in Linux to check or modify network configuration settings? (Choose two.) A. ipconfig B. ifconfig C. iwconfig D. inconfig

B, C. The ifconfig command is used to view and change network settings, whereas iwconfig is used to view and change wireless network settings. The ipconfig command is used in Windows.

Which of the following features are typically present in mobile operating systems by default, but not in desktop operating systems? (Choose two.) A. SDK B. Power options C. Gesture-based interaction D. Emergency notifications

C, D. To interact with a mobile operating system, people can use gesture-based interaction, or gestures. Mobile devices also have emergency notifications built-in, for Amber alerts or government-declared emergencies. Software development kits (SDKs) are available for nearly all OSs, as are power options.

You want to start the visual file editor on your Linux server. Which command is used to do that? A. cd B. ps C. vi D. cp

C. The vi command (shortened from visual) is used to open a window-oriented text editor in Linux. The cd command is for change directory, ps lists processes, and cp is copy.

Which type of cloud service provides your company with the network hardware, infrastructure, and software needed to run your business? A. PaaS B. NaaS C. IaaS D. SaaS

D. The highest of the three levels of cloud service is Software as a Service (SaaS), which handles the task of managing software and its deployment, and it includes the platform and infrastructure as well. This is the model used by Google Docs, Microsoft Office 365, and even storage solutions such as Dropbox.

You have just joined a new network team, and one of your coworkers reports that he is frustrated from working on a legacy system. Which of the following might he be referring to? (Choose two.) A. The sales management software that was created in the 1980s B. The file server that runs on a Windows NT 4.0 server C. The accounting software that runs on a Linux server D. The graphic arts package that runs on an iMac

A, B. Legacy means that the system is old and hopelessly outdated by today's computing standards. Legacy systems are usually defined as those using old technology in one or more of the following areas: hardware, software (applications or OS), or network protocols.

Your network uses a Linux file server. It has four volumes, each formatted with ext4. You want to check the /ops/files volume for any filesystem errors and fix them. Which command should you use? A. fsck /ops/files B. du /ops/files C. df /ops/files D. chkdsk /ops/files

A. The fsck (file system check) command is used to examine volumes for errors, as well as attempt to fix them. The command is analogous to the chkdsk command for Windows-based computers. Be sure that the volume is unmounted before using fsck, to avoid corrupting data.

You want to enable data synchronization for your iPhone. Which two statements are true regarding Wi-Fi synchronization? (Choose two.) A. You must enable Sync over Wi-Fi within iTunes. B. You can sync to iCloud only over Wi-Fi. C. The iPhone should be plugged into a USB port. D. The iPhone and computer must be on the same network SSID.

A, D. There are two ways to sync an iPhone: using Wi-Fi and using a USB connection. If you are going to use Wi-Fi, it must first be enabled in iTunes. The device should not be plugged into a USB port because that will take precedence over the Wi- Fi connection. Both devices must be on the same network SSID.

While using your mobile phone, you want to set up a secure connection over a Wi-Fi network. What type of connection do you need to enable? A. VPN B. IMEI C. IMSI D. PRI/PRL

A. A virtual private network (VPN) is a secured network connection made over an unsecure network. For example, if you wanted to connect your phone to your corporate network over the Internet in order to read email but you also wanted to secure the connection, you could use a VPN. IMEI and IMSI are identifier numbers, and PRI and PRL are configuration lists the phone uses.

A network consultant recommended to your boss that you install an IPS. Which of the following statements best describes what an IPS does? A. It detects anomalies in network traffic, logs the activity, and takes actions to stop the activity. B. It detects viruses transmitted across the network, logs the activity, and deletes the network packets infected with the virus. C. It detects anomalies in network traffic, logs the activity, and sends an alert to the administrator. D. It allows or denies incoming network traffic based on a set of rules.

A. An Intrusion Protection System (IPS) is an active device. It monitors network traffic, and when it detects an anomaly, it can take actions to attempt to stop the attack. For example, if it senses suspicious inbound traffic on a specific IP port, it can shut the port down, block the sender, or reset the TCP connection.

A user types in her username and password into a workstation that is configured in a domain. Which type of server examines her information and determines whether she gets access to network resources? A. Authentication server B. Proxy server C. File server D. DHCP server

A. An authentication server is a device that examines the credentials of anyone trying to access the network, and it determines whether network access is granted. Said another way, they are gatekeepers and critical components to network security. A common term that you will hear in the Microsoft world is domain controller, which is a centralized authentication server.

You are configuring client-side virtualization on an existing Windows 8.1 64-bit workstation. You will be running OS X Yosemite in the virtual environment. Each OS requires 2GB of RAM. Windows needs 20GB of disk space and Yosemite needs 8GB. What are the minimum hardware requirements for this workstation? A. 4GB RAM, 28GB disk space B. 2GB RAM, 20GB disk space C. 2GB RAM, 28GB disk space D. 4GB RAM, 20GB disk space

A. If presented with a scenario for installing multiple operating systems on a computer running client-side virtualization, just add the minimum hardware requirements (or recommendations) together. Treat it as if each OS needs its own minimum (which it does) and they are just sharing the available physical hardware (which they are). Also, each OS needs its own virtual network card to participate on the network and needs its security to be individually configured based on OS requirements and user needs. Treat it as though it is a separate computer.

You have a MacBook Pro and want to share files with a small group of Mac users. Because your team edits the files frequently, you want to make sure everyone has access to the same version of the files online. What storage solution should you use? A. iCloud B. Finder C. Remote Disc D. Spotlight

A. One of the best ways always to have the latest version of files, regardless of the device that you are using to access them, is to have them stored/accessed remotely. iCloud is Apple's answer to remote storage, and you can configure your Apple devices to place files there automatically, or use it for backup.

What type of update does your mobile phone need if you need to refresh the reference list the phone uses to connect to the proper cell phone tower when roaming? A. PRL B. PRI C. Baseband D. IMEI

A. The Preferred Roaming List (PRL) is the reference guide the phone uses to connect to the proper cell phone tower when roaming. Product Release Instruction (PRI) contains settings for configuration items on the device that are specific to the network that it's on. Both PRI updates and PRL updates normally happen when the primary OS on the phone is updated, but your carrier may let you update them manually.

Which Linux command is used to copy and convert files from one format to another? A. dd B. cp C. mv D. rm

A. The dd (data definition) command is used to copy files and can also be used to convert files from one format to another. It can also be used to copy blocks of data from a file and to back up the boot sector of the hard drive. The cp command will copy files but is not used for file conversion.

You are configuring your Android phone to synchronize with your Windows 8.1 workstation. Which of the following types of data will not be synchronized between the devices? A. Passwords B. Bookmarks C. Email D. Social media data

A. Passwords are not synchronized between devices. Types of data that are synchronized include contacts, programs, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, and ebooks.

A user with an Android phone reports that it isn't properly detecting where she touches the virtual keyboard—it seems to be a bit off. What should she do to resolve the issue? A. Recalibrate the screen. B. Turn the phone off and back on again. C. Perform a reset to factory specifications. D. Purchase a new device.

A. Some mobile devices give you the option to improve the ability of the computer to recognize how you personally actuate the sensors. For example, many phones allow you to re-calibrate (or retrain) the onscreen touch keyboard. That would be the first thing to try in this situation.

The MacBook you are using does not have a built-in DVD player, but you need to access some files stored on one. Which macOS feature allows you to access the DVD player on another computer? A. Remote Disc B. Finder C. Spotlight D. iCloud

A. The objectives might say Remote Disk, but the feature is officially called Remote Disc (disc with a c). This feature lets you access files on a CD or DVD installed in one machine on a remote machine. This is handy if you need to retrieve files from a disc and the workstation at which you are sitting does not have a built-in drive.

You need to start a new shell on a Linux workstation, with root permissions. Which command should you use to do this? A. su B. sudo C. vi D. dd

A. The su command (switch user, substitute user, or super user) is used to start another shell on a Linux computer. Without specifying the username, it's assumed you are trying to start a shell with superuser (or root) authority.

Your company has decided to purchase cloud services from Google. What type of cloud does Google provide? A. Public B. Private C. Hybrid D. Community

A. The traditional type of cloud that usually comes to mind is a public cloud, like the ones operated by third-party companies such as Microsoft, Google, HP, Apple, Netflix, and Amazon. These clouds offer the best in scalability, reliability, flexibility, geographical independence, and cost effectiveness. Whatever the client wants, the client gets. For example, if the client needs more resources, it simply scales up and uses more.

One of your network users has a MacBook Pro running OS X Yosemite. Where should this user go to see whether there are any OS updates available? A. Open the App Store and click Updates in the toolbar. B. Open Safari and click Updates in the toolbar. C. Open System Preferences and click Updates in the toolbar. D. Open iTunes and click Updates in the toolbar.

A. Updates to macOS Yosemite can be found at the App Store. Open it, and click Updates in the toolbar to see which updates are available. There will be an Install button to begin the installation. In System Preferences, there is generally a Software Update icon to help with updates as well.

Which feature of macOS allows others to see your screen, and requires a Virtual Network Computing (VNC) connection? A. Remote assistance B. Shell/Terminal C. Image sharing D. Screen sharing

D. Screen sharing is a macOS feature that allows you to share your screen with others. It requires a Virtual Network Computing (VNC) connection.

Which type of server will extensively use ports 25 and 143 in its communications with clients on the network? A. Print server B. Mail server C. DHCP server D. Authentication server

B. Email is critical for communication, and mail servers are responsible for sending, receiving, and managing email. There are three primary email protocols used today: SMTP (port 25), POP3 (port 110), and IMAP4 (port 143).

You are installing virtualization on a workstation that needs to support multiple operating systems. Which type of hypervisor is best suited for this environment? A. Type 1. B. Type 2. C. Either Type 1 or Type 2 will function in the same way. D. Virtual machine manager.

B. A Type 2 hypervisor sits on top of an existing operating system, called the host OS. This is most commonly used in client-side virtualization, where multiple OSs are managed on the client machine as opposed to on a server. The hypervisor is also called a virtual machine manager (VMM).

Which mobile operating system has versions named for types of candy or sweets? A. BlackBerry OS B. Android C. iOS D. Windows Phone

B. Android started off as its own company and was purchased by Google in 2005. Like Google's Chrome OS, Android is Linux based. It's primarily installed on smartphones, but it is also found on specialized television, automobile, and wristwatch devices. Versions of Android are named after candy, such as Ice Cream Sandwich, Jelly Bean, KitKat, and Lollipop.

You have a MacBook Pro and need to run a critical application for work that is compatible only with Windows. Is there any way you can do this? A. Yes, Macs will run Windows applications natively. B. Yes, use Boot Camp to install Windows and dual boot. C. Yes, use Dock to install Windows and dual boot. D. No, you can't run the Windows application.

B. As great as macOS is, there are times when you need Windows—for compatibility purposes with apps, legacy data, and many others. Because of this, you can use Boot Camp to install Windows on a Mac computer and then choose between operating systems as you boot. The Mac computer must be Intel based, you need to have a 64-bit version of Windows, and you need a minimum of 30GB of free disk space for it to work.

What type of cloud service offers the best security? A. Community B. Private C. Public D. Hybrid

B. Companies can purchase virtualization software to set up individual clouds within their own network. That type of setup is referred to as a private cloud. Running a private cloud pretty much eliminates many of the features that companies want from the cloud, such as rapid scalability, and eliminates the need to purchase and manage computer assets. The big advantage, though, is that it allows the company to control its own security within the cloud.

Which type of server maintains a database called a zone file, which it uses to provide clients with requested information? A. Authentication server B. DNS server C. DHCP server D. Proxy server

B. DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. Each DNS server has a database, called a zone file, which maintains records of hostname to IP address mappings.

One of the workstations on your network runs Ubuntu Linux. Which command can you use to install patches to upgrade the operating system? A. apt-cache B. apt-get C. vi-get D. chown-get

B. Depending on the variant of Linux you are running, apt (Advanced Package Tool) can be useful in getting the patches from a repository site and downloading them for installation. The most common command used with this tool is apt-get, which, as the name implies, gets the package for installation.

Which type of server on your network could have its functionality replaced with NAS or a SAN? A. Mail server B. File server C. Print server D. Web server

B. File servers provide a central repository for users to store, manage, and access files on the network. Networks can also use network attached storage (NAS) devices, which are stand-alone units that contain hard drives, come with their own file management software, and connect directly to the network. If a company has extravagant data storage needs, it can implement a storage area network (SAN). A SAN is basically a network segment, or collection of servers, that exists solely to store and manage data.

You are working on a Linux workstation. A file named docs needs to be renamed to newdocs. What is the right command to execute this? A. ren docs newdocs B. mv docs newdocs C. cp docs newdocs D. rm docs newdocs

B. In Linux, the mv (move) command is used to rename files. The cp command copies a file, but that is a different process than moving it. rm is short for remove, and it deletes files. ren is a DOS or Windows command to rename files.

Which feature of cloud service allows you to instantly obtain additional storage space or processing power as your company needs it? A. Ubiquitous access B. Rapid elasticity C. Resource pooling D. Measured service

B. In most cases, clients can get more resources instantly (or at least quickly or on-demand), which is called rapid elasticity. For the client, this is a great feature because |they can scale up without needing to purchase, install, and configure new hardware.

Your manager tells you to purchase cloud-based services. Your network needs extra processing power and file storage. What type of service should you purchase? A. PaaS B. IaaS C. SaaS D. NaaS

B. Let's say that your company needs extra network capacity, including processing power, storage, and networking services (such as firewalls), but doesn't have the money to buy more network hardware. Instead, you can purchase Infrastructure as a Service (IaaS), which is a lot like paying for utilities—you pay for what you use. Of the three, IaaS requires the most network management expertise from the client side. In an IaaS setup, the client provides and manages the software.

You are configuring your tablet computer to connect to your corporate email server. Which ports do you need to set up if you want to use SMTP with SSL and IMAP4 with SSL? A. 25 and 143 B. 465 and 993 C. 465 and 995 D. 587 and 993 E. 587 and 995

B. SMTP uses port 25, and IMAP4 uses port 143. However, when they run over SSL, SMTP uses port 465, and IMAP4 uses port 993. SMTP over TLS uses port 587, and POP3 over SSL or TLS uses port 995.

You are consulting with a mobile phone company. They tell you that for a new usage tracking program, they want to use the 15-digit number that identifies a user and their network. Which number are they looking for? A. IMEI B. IMSI C. PRI D. PRL

B. The International Mobile Subscriber Identity (IMSI) is a unique 15-digit identifier that describes a specific mobile user and their network. It's composed of three elements: a mobile country code, a mobile network code, and a mobile station identifier. The International Mobile Equipment Identity (IMEI) is also a 15-digit serial number, but it identifies the specific phone.

A user wants to perform a backup on his MacBook running OS X El Capitan. Which software utility should he use to do this? A. Image Recovery B. Time Machine C. iBackup D. MacBackup

B. The backup software for all current versions of Mac OS is called Time Machine. It allows users to back up and restore files just like any other commercial backup software.

You are working on a Linux file server. Which command would you use to see the amount of free disk space on a volume? A. fsck B. df C. du D. vi

B. The df (disk filesystem) command is used to show free and used disk space on a volume.

You are at a Linux workstation and need to search for text within several files. Which command should you use? A. sudo B. grep C. cp D. ls

B. The grep command (short for the impossibly long "globally search a regular expression and print") does just what it says it does: it searches for a string of text and then displays the results of what it found.

You are working on a MacBook Pro and need to search the computer for a document you wrote a few months ago. Which feature should you use to search the hard drive? A. Keychain B. Spotlight C. Finder D. Siri

B. The search feature within macOS is Spotlight, and a magnifying glass icon in the upper-right corner of the menu bar represents it (or you can press Command+spacebar from any app). Spotlight can search for documents, images, apps, and so on.

One of your users has a MacBook Pro, and an application appears to have crashed. What can she use to force the app to close? A. Task Manager B. Force Quit C. Shell/Terminal D. Time Machine

B. When an app hangs inside the Mac OS, you can use Force Quit to force it to close. Most devices, whether running Mac OS or iOS, offer similar options. You get to Force Quit by looking at the Apple menu or by pressing Command+Option+Esc, which is analogous to pressing Ctrl+Alt+Del on a PC.

You want to download applications for a device running iOS. Where will you download them from? A. Android Market B. Google Play C. App Store D. Windows Store

C. Apple produces iOS, and all of its apps can be found on the App Store. Google Play is used for Android-based devices, and it replaced Android Market. Windows Phone apps are found at the Windows Store.

On your network, a few users have been accessing material on inappropriate websites. What type of server can you install to block content from a list of prohibited websites? A. DNS server B. Authentication server C. Proxy server D. Web server

C. A proxy server makes requests for resources on behalf of a client. Proxy servers are known for three things. One, the proxy server can cache the information requested, speeding up subsequent searches. Two, the proxy can act as a filter, blocking content from prohibited websites. Three, the proxy server can modify the requester's information when passing it to the destination, blocking the sender's identity and acting as a measure of security; the user can be made anonymous.

Which type of server on your network will utilize UDP ports 67 and 68 to communicate with other computers? A. Authentication server B. Print server C. DHCP server D. DNS server

C. DHCP servers provide TCP/IP configuration information to client computers. Clients will broadcast, searching for the DHCP server. The server will respond and provide the client with its IP address, subnet mask, default gateway, and other information. DHCP uses UDP ports 67 and 68.

In your web browser, you type www.google.com and press Enter. Which type of server identifies the owner of that name and tells your computer the IP address of the server you want to communicate with? A. Proxy server B. DHCP server C. DNS server D. Authentication server

C. DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. The URL www.google.com means nothing to it. When a user enters the URL, the computer needs to figure out what the address is. The DNS server provides the answer, "That is 72.14.205.104." Now that the computer knows the address of the website that the user wants, it's able to go find it.

You are setting up virtualization on a server that will be running four instances of Windows Server 2012 R2. Four different departments will be using one instance each, and all departments have been promised 16GB RAM. Using resource pooling and using a bare-metal hypervisor, what is the minimum amount of physical RAM needed on the server? A. 16GB B. 32GB C. 64GB D. 8GB

C. If each client has been promised 16GB RAM, then the server must have enough RAM to give each client their allotment. This means 64GB in this case. The assumption is that the hypervisor will require no RAM on its own. In reality, it probably will require a little but not much.

One of your network users has a MacBook Pro running OS X Mavericks. She asks you about installing or updating antivirus software. What should you tell her? A. There are no viruses for Macs, so no antivirus software is needed. B. Use the free MacAntiVirus program that comes with the OS and set it to update automatically. C. Install a commercial antivirus program and set it to update automatically. D. Install a host-based firewall and set it to update automatically.

C. It's a fairly common myth that there are no macOS viruses out there. The reality is that every operating system can be affected by malware. Because of this, it is imperative to have protection on every machine. Additionally, this protection—in the form of definition files—must be kept current and up-todate. The best way to do that is to set the software to automatically update.

Which piece of software on a mobile phone manages all wireless communication for the phone? A. PRI B. PRL C. Baseband OS D. SIM OS

C. Most mobile phones have three operating systems. The first is the primary OS, such as iOS or Android. Second, there is the baseband OS that manages all wireless communication, which is actually handled by a separate processor. Third, a subscriber identity module (SIM) OS manages all data transfers between the phone and the SIM chip, which is a small memory chip that stores user account information, phone identification, and security data, and it is generally tied to a specific carrier. Some people will call the wireless communications chips in a mobile phone the radio or the modem. Consequently, you might hear about radio firmware, a radio firmware update, or a modem update. The last two terms are interchangeable with baseband update, which simply means an update of the baseband OS.

You are working on an iMac, and about a dozen applications are open. Which feature allows you to easily see all of them and switch to your desired application? A. Spotlight B. Keychain C. Mission Control D. Finder

C. On a Mac, it's possible to run a large number of things at one time, whether those things in question are apps or desktops. Apple's Mission Control is an easy way to see what is open and switch between applications. To access Mission Control, you can press the Mission Control key on an Apple keyboard, click the Mission Control icon in Dock (or Launchpad), or swipe up with three or four fingers on a trackpad.

Your company produces software and employs about 20 developers. They need to program apps for different operating systems. You decide to purchase cloud-based services to support the development team. What type of service should you purchase so they can develop their programs and then test them in environments other than where they were developed? A. IaaS B. SaaS C. PaaS D. NaaS

C. Platform as a Service (PaaS) adds a layer to IaaS that includes software development tools such as runtime environments. Because of this, it can be helpful to software developers; the vendor manages the various hardware platforms. This frees up the software developer to focus on building their application and scaling it. The best PaaS solutions allow for the client to export their developed programs and run them in an environment other than where they were developed.

You call your cell phone provider to do some troubleshooting, and they tell you they need the phone's 15-digit serial number. What number are they looking for? A. PRI B. PRL C. IMEI D. IMSI

C. The International Mobile Equipment Identity (IMEI) is a 15-digit serial number that is unique to each phone. If a phone is reported stolen, the IMEI will be declared invalid. The IMEI can be displayed on most phones by dialing *#06#. AT&T and T-Mobile were the first networks to use IMEI. The International Mobile Subscriber Identity (IMSI) is also a unique 15-digit identifier, but it describes a specific mobile user and their network.

You are at a Linux workstation on your network with the terminal open. Which command can you issue to see the size of files and directories on this computer? A. fsck B. df C. du D. vi

C. The du (disk usage) command will show how much disk space is being used. By default, it shows usage in disk blocks, which isn't very reader-friendly. Use the -h option to show it in kilobytes, megabytes, and so on, and the -a option to show all files and directories. To use both together, the syntax would be du -ah /[volume_name].

Your company has an application developer who creates programs for Windows, Linux, and macOS. What is the most cost-effective solution for her to be able to test her programs in multiple operating systems as quickly as possible? A. Buy workstations for each of the OSs she codes in. B. Set up her workstation to dual boot. C. Set up her workstation with virtual machines. D. Create one version of each application that will run in all three OSs.

C. The major feature of virtualization is breaking down that one-to-one hardware and software barrier. The visualized version of a computer is appropriately called a virtual machine (VM). Thanks to VMs, it is becoming far less common to need dual-boot machines today than in the past. VMs allow computers to do things like run five instances of an OS or one instance of several different OSs.

Which of the following mobile operating systems is an open-source OS? A. iOS B. Windows Phone C. BlackBerry OS D. Android

D. Google offers the Android operating system to the mobile community under an open source license. Apple and Microsoft keep their mobile OSs closed source, and they manage all the development and marketing of their operating systems. BlackBerry OS was closed source as well. Apps for mobile operating systems are created using a free software development kit (SDK). Android apps are installed using an Android application package (APK).

One of the designers on your network has an iMac running OS X El Capitan. Which of the following is not considered necessary with this workstation? A. Running scheduled backups B. Installing antivirus software C. Updating drivers and firmware D. Defragmenting the hard drive

D. Macs use the HFS+ file system, which Apple states does not require defragmentation like FAT or NTFS do. Therefore, disk defragmentation is not generally necessary. Regardless of the operating system, you should always back up data (unless you don't mind losing it), install and update antivirus software, and keep drivers and firmware current.

You have a user who just purchased a Windows Phone. He wants to know what the name of the virtual assistant is on his phone. What do you tell him? A. Windows Phone does not have a virtual assistant. B. Windy. C. Siri. D. Cortana. E. Alexa.

D. Nearly all mobile operating systems now come with a virtual assistant. Cortana is the name of the Windows Phone (and Windows 10) virtual assistant. Windy is not currently the name of one. iOS uses Siri, and Amazon devices use Alexa.

Which command is used to change a file's permissions in Linux? A. chperm B. cp C. chown D. chmod

D. The chmod (change mode) command is used in Linux to change file permissions.

Your manager asked you to find a device for network security. He wants it to be able to perform packet filtering, shut down network attacks, block spam, and prohibit access to inappropriate websites. What type of device should you look for? A. Firewall B. IPS C. IDS D. UTM

D. The goal of unified threat management (UTM) is to centralize security management, allowing administrators to manage all of their security-related hardware and software through a single device or interface. A UTM device can generally provide the following types of services: packet filtering and inspection, intrusion protection service, gateway anti-malware, spam blocking, malicious website blocking, and application control.

On a Linux workstation, which command do you use to display the contents of a directory? A. dir B. grep C. cp D. ls

D. The ls (list) command is used in Linux to show the contents of a directory.

You are updating user accounts on a Linux workstation and need to change a user's password. Which command do you use to do this? A. chperm B. cp C. pwd D. passwd

D. The passwd command is used in Linux to change user passwords. The similar-looking pwd command displays the current directory.

The Linux workstation you are using seems slow. You want to see what processes are running on the computer. Which command should you use? A. vi B. cp C. dd D. ps

D. The ps (process status) command in Linux is used to show currently running processes.

In Linux, what is the name of the interpreter between the user and the operating system? A. Terminal B. Command prompt C. GUI D. Shell

D. The shell is the interpreter between the user and operating system. The most popular shell for Linux today is Bash (an acronym for Bourne Again Shell), but csh (C-shell), ksh (Korn shell), and a number of others are also in use. The terminal is used to enter commands and interface with the shell.

On your MacBook Pro, what is the name of the utility used to browse through files and folders? A. Spotlight B. Remote Disc C. iCloud D. Finder

D. To use an analogy, Finder is to macOS what Windows Explorer is to Windows 7. It lets you browse through folders and find files, disks, apps, and so on. You can change the view to see the entries with images, a list view, a column view, and so on.

Which type of server on a network is responsible for listening for inbound traffic on ports 80 and 443? A. DHCP server B. DNS server C. Mail server D. Web server

D. Whenever you visit a web page, you are making a connection from your device (the client) to a web server. To be more specific, a connection is requested by your Internet software (generally a web browser) using the Hypertext Transfer Protocol (HTTP) of the TCP/IP protocol suite. Your client needs to know the IP address of the web server, and it will make the request on port 80. Secure web connections are made using Hypertext Transfer Protocol Secure (HTTPS) and port 443.


Ensembles d'études connexes

Lesson 110 Homework: Voltage Drop, Cable, Conduit, and Tubing

View Set

Introduction to Human Physiology Chapter 6 Practice Questions

View Set

Utilitarianism 1: Structure and Objections

View Set