Google IT Support Professional Certificate: System Administration and IT Infrastructure Services, week 4.0

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What would you use if you wanted to set a default wallpaper background for all machines in your company, but still wanted users to be able to set their own wallpaper?

A preference

What is reverting to a previous state called?

A rollback

In Active Directory, a Domain Controller functions as which of the following? Check all that apply.

A server that holds a replica of the Active Directory database, A DNS Server, A Kerberos authentication server

What roles does a directory server play in centralized management? Check all that apply.

Accounting, Authorization, Centralized Authentication

What should you avoid using for tasks that don't require it?

Administrator rights

Updating your servers once every month or so with the latest security patches

Batch update

How are things organized in a directory server?

By a hierarchical model of objects and containers

What are two drawbacks to cloud storage?

Cost and Dependency

A facility that stores hundreds, if not thousands, of servers

Data Center

What two factors make it more important to keep servers functioning?

Dependent users and importance in the company

Hardware lifecycle stage where hardware is set up so that an employee can do their job

Deployment

What is the second hardware lifecycle stage?

Deployment

Which component of an LDAP entry contains the unique entry name?

Distinguished name

Which of the benefits below make using an Infrastructure as a Service (IaaS) provider a better option than purchasing dedicated physical hardware? Check all that apply.

Having low initial costs Not needing to manage physical servers Using a server for a short amount of time

Which might have an IT infrastructure run by a single person?

Hometown Independent Computer Company, LLC; In smaller companies, it's usually a single person who manages an entire company's IT infrastructure.

What encompasses the software, hardware, network, and services required for an organization to operate in an enterprise IT environment?

IT infrastructure

What does IaaS stand for?

Infrastructure as a Service

What service allows a company to pay for virtual machines which can be run as servers through the cloud? Popular options include Amazon EC2, Linode, Windows Azure, and Google Compute Engine

Infrastructure as a Service

The following is a common policy question: Should users be allowed to view non-work-related websites, like Facebook?

It depends (Company preference)

In order to authenticate user accounts against AD, what must be done to the computer first?

Join it to the domain

What can be connected to multiple computers, and allows someone to use those computers with one keyboard, one mouse, and one monitor?

KVM switch

What does KVM stand for?

Keyboard Video Mouse

What is the main advantage of using DHCP?

Leases IP addresses, removing the need to manually assign addresses

Hardware lifecycle stage where software is updated and hardware issues are fixed if and when they occur

Maintenance

What is the third hardware lifecycle stage?

Maintenance

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

NTP

Which of the following is not a network file transfer protocol?

NTP

What does NaaS stand for?

Networking as a Service

What service takes care of both networking hardware and setting up a network (or networks) for a company?

Networking as a Service

An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?

PaaS (Platform as a Service)

What does PXE Boot stand for?

Pre boot execution

Which is not a component of a KVM switch? monitor mouse keyboard printer

Printer; Printing services are compatible with but irrelevant to KVM switches!

The following is common policy question with a generally agreed upon answer: Should users have complex passwords with certain requirements?

Probably

The following is common policy question with a generally agreed upon answer: Should users be allowed to install software?

Probably not

Hardware lifecycle stage where hardware is purchased or reused for any employee

Procurement

What is the first hardware lifecycle stage?

Procurement

In an infrastructure context, it is the parts of the infrastructure where a certain service is executed and served to its users

Production

In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from a Windows machine? Check all that apply.

PuTTY WinRM

Creating a roadmap to retrace the steps that led the user to an unexpected outcome; reproducing an error to be able to test solutions

Reproduction case

Hardware lifecycle stage where hardware becomes unusable or no longer needed and it needs to be properly removed from the fleet

Retirement

What is the fourth hardware lifecycle stage?

Retirement

Instead of assigning access for each user account individually, ________ is a more efficient and easier-to-manage approach.

Role-Based Access Control (RBAC)

If you wanted to securely transfer files from your local machine to a web server, what file transfer protocol could you use?

SFTP

A client discovers the address of a domain controller by making a DNS query for which record?

SRV record

Which of the following options allow you to access a computer remotely? Check all that apply.

SSH VPN

Software or a machine that provides services to other software or machines

Server

Let's say that you're the sole IT person at your company. The company is a very small startup, and they need to set up a few non-critical services and have a single physical server in place. What's the best approach to fully utilize this server?

Set up virtualized servers on the server

What are the three ways to authenticate to an LDAP server?

Simple bind, Anonymous bind, SASL

When there are conflicting GPOs, what's the order in which they're evaluated and applied?

Site, Domain, OU

Windows command to record a group of commands as they're being issued along with their output

Start-Transcript

Adding and removing users when they join or leave a company, as well as provisioning users with working machines and software, is the responsibility of who?

Sysadmins

A sysadmin is looking to use Pre Booth Execution over a network by keeping operating system installation files on a server. Which type of server is this most likely to be?

TFTP server

A virtual machine running the same configuration as the production environment, but isn't actually serving any users of the service

Test environment

What are the three most common server form factors?

Tower, Rack, and Blade

A website is inaccesible via its URL. You've pinged the site and see no problem there. What is the next troubleshooting step?

Use nslookup in the terminal to rule out DNS issues

The following is common policy question with a generally agreed upon answer: If you hand out a company phone to an employee, should you set a device password?

Yes

What are the advantages of using Infrastructure as a Service (or IaaS) solutions? Check all that apply.

You can have the hardware you need without upgrading any actual hardware You're not responsible for managing hardware tasks Operating system updates are taken care of for you

When you make a DNS query, where does your computer first check to find an IP address to name mapping?

Your local machine

Which of these is considered a server? Check all that apply.

a computer that provides a service to other computers; Servers are essentially software or computers that provide a service to other software or computers. a software that provides a service to other software software that provides a service to other machines

Which of the following is a good policy to enforce on passwords? Check all that apply.

a long password length; Passwords are one of the first and biggest security policies that help prevent unauthorized access. A good policy for passwords is to make them long and with a mixture of symbols, numbers, uppercase, and lowercase characters. a mixture of symbols and numbers

As sysadmin, you will have to prioritize issues. Which of these issues would be a top priority?

a server stopped providing service to 100 users.

Which of these are part of the five primary elements that make up a post-mortem report? Check all that apply.

a summary a timeline resolution and recovery steps a root cause description recommend future action items

Which of the following can be a responsibility of a systems administrator? setting up new user accounts and machines maintaining servers troubleshooting user issues all of the above

all of the above; A systems administrator has a wide range of responsibilities; this can include, but is not limited to, setting up new user accounts and machines; maintaining servers; and troubleshooting user issues.

Which of these are common responsibilities of systems administrators? constantly troubleshoot problems, such as network issues all of the above work in the background to make sure a company's IT infrastructure is always working help users with issues, such as lost passwords and logon problems

all of the above; Employees need computers along with proper software to be productive! Fun fact: up to 25% of people forget their password at least once a day!

Which of the following make up IT infrastructure? hardware and software network operating systems all of the above

all of the above; IT infrastructure encompasses the software, hardware, network, operating systems, and other services required for an organization to operate in an enterprise IT environment.

Which of these are common backup tools you might consider when designing a backup solution? Check all that apply.

backup and restore rsync time machine

Budget constraints aside, what is the ideal backup solution?

both

What options are available for storing backups, physically?

both

Which of these are components of a post-mortem report? Check all that apply.

brief summary detailed timeline of key events explaining of solution and recovery effort

With _______, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection.

cloud computing; The cloud is a network of servers that store and process our data. We refer to the concept of cloud computing as a way to do our daily computer job functions from anywhere, as long as we have an Internet connection.

A disaster recovery plan is a collection of documented procedures and plans on how to react and handle an emergency or disaster scenario from an operational perspective. What are important elements of a disaster recovery plan? Check all that apply.

corrective and recovery measure preventative measure detection measure

Which of these terms describe a facility that stores hundreds, if not thousands, of servers?

data center; Companies with large amounts of data have to keep their information stored in places like data centers. A data center is a facility that stores hundreds, if not thousands, of servers.

The IT department sets up a user account and software. Which stage of the hardware lifecycle does this situation belong to?

deployment; The deployment stage of the hardware lifecycle usually occurs when a machine is first set up, like in this example.

What types of backup schemes are available? Check all that apply.

full/differential/incremental

What's the purpose of a post-mortem report?

learn from mistakes

You're the sole IT employee at your company, and you don't know how many users or computers are in your organization. Uh oh! What can you use to easily manage the users in your company?

not Physical Infrasturucture Services, Platform Services

Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability?

not incremental

Which type of backup only saves copies of files that have been changed or created since the last backup?

not incremental differential backups

You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of preventative measures? Check all that apply.

operational doc alert sys for outages regular automated backups redudancy solutions

The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn't go smoothly. You decide to investigate. What is a commom term in the IT community for this investigation?

post mortem

What are the measures included in a disaster recovery plan?

preventative detection recovery

As a sysadmin, you will find yourself doing business with a variety of third-party vendors. Which of these are likely to be rented or bought from a vendor? Check all that apply.

printers; Sysadmins might be responsible for making sure printers are working, or if renting a commercial printer, they have to make sure that the vendor can be on-site to fix it. fax machines video or audio conferencing machines

An IT department uses a pre-used laptop out of their hardware inventory for a new user. Which stage of the hardware lifecycle does this scenario belong to?

procurement; The procurement stage of the hardware lifecycle can include situations where pre-used machines are reused for a new user.

A company has a "bring your own device" (BYOD) policy for computers; anyone can just go out and buy whatever computer they want. Which stage of the hardware lifecycle does this scenario belong to?

procurement; When an employee obtains access to hardware, this falls into the procurement stage of the hardware lifecycle.

What are advantages of on-site backups? Check all that apply.

quicker data access less bandwidth usage data is more secure because less outbound traffic

Which of these server hardware can you stack on top of each other in a server rack?

rack; A rack and a blade server lay flat and can be stacked on top of each other when you mount them on a server rack. blade

Linux tool which can be used to record an interaction with a graphical application

recordMyDesktop

You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of corrective or recovery measures? Check all that apply.

restoring data from backup hardware repair and replacement rebuilding and re configuring services

Which of these is part of the hardware lifecycle? Check all that apply

retirement procurement deployment; The hardware lifecycle consists of four main stages: Procurement, Deployment, Maintenance, and Retirement.

The machine has to be returned to the vendor for proper recycling. Which stage of the hardware lifecycle does this scenario belong to?

retirement; The retirement stage of the hardware cycle can include situations where a vendor recycles the machines.

Cloud services are the ideal backup option for user files. Which of these is not one of today's popular cloud storage platforms?

rsync

Linux command to record a group of commands as they're being issued along with their output

script

What are the benefits of cloud computing over local computing? Check all that apply. services are accessible from anywhere in the world there are potential long-term costs associated with cloud computing there are smaller starting costs for cloud computing software updates are handled by the company providing the service

services are accessible from anywhere in the world; Cloud computing has some great benefits, like smaller starting costs, services that are accessible anywhere in the world with an Internet connection, and software updates that are handled by another company. there are smaller starting costs for cloud computing You didn't select all the correct answers!

A KVM switch is used to:

switch between multiple computers using one monitor, keyboard, and mouse; A KVM switch is a device used to switch between multiple computers using one keyboard and video display, like a monitor and mouse. That's where the name "KVM" comes from!

How can you verify that your disaster recovery plan will be effective? Check all that apply.

through testing, through disacster simulation

Which type of server most closely resembles a desktop computer in appearance?

tower server; Server hardware can come in lots of different forms: they can be towers that sit upright and look very similar to the desktops we've seen

What are the benefits of local computing over cloud computing? Check all that apply.

updates can be handled at anytime; With local computing, you're in complete control of your IT infrastructure and can update and secure your organization at anytime. you have complete control of the IT infrastructure

What are some ways you can make your backups more space-efficient? Check all that apply.

use incremental backups use compression

You are performing a network risk assessment to develop your disaster recovery plan. Which of these are examples of detection measures? Check all that apply.

using alert system for outages monitoring system testing testing your own and users knowledge and readiness for disasters

An employee is leaving your company. Which of these steps are appropriate to take during offboarding? Check all that apply.

wipe the machine for future use; If a user leaves the company, you'll also have to wipe the machine, so that you can eventually reallocate it to someone else. remove the user's access to IT resources


संबंधित स्टडी सेट्स

RADREVIEW EASY: IMAGE PRODUCTION

View Set

English 314 Passages - FINAL EXAM

View Set

Module 2_Introduction to Economic Analysis

View Set

Macro economics chapter 2 quiz questions

View Set

Unit 7: Agency Module 12: Agency Relationships Quiz

View Set