Final Exam Flashcards

1
Q

To organize network cabling, a network use _____________

A

Structured cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the fancy name for the wiring closet?

A

Intermediate DIstribution Facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a set of network closets and wiring that brings network connectivity out to the desktops

A

Intermediate Distribution Facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This requires to be physically protected

A

Intermediate Distribution Facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the USENIX / LISA / LOPSA Code of Ethics for System Administrators?

A

Professionalism
Personal Integrity
Privacy
Laws and Policies
Communication
System Integrity
Education
Responsibility to Computing Community
Social Responsibility
Ethical Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Linux Distributions?

A

These are operating systems that share the same Linux Kernel, buy differ by the set of tools, applications, and package managers that they come with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux distros may come in?

A

Readily compiled or in code form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the some common distros?

A

Red Hat - Built to be more suited for use on servers
Open SUSE - Targetted for software developers and system administrators
Debian - Community backed distribution which directly supports several non-intel / AMD platforms
Ubuntu - Most popular desktop / server distro derived from Debian
Android - Uses the Linux kernel, but lacks support for many tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These can be used to specify patterns to match filenames in a directory

A

Metacharacters also referred as wildcards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Metacharacters are interpreted by the shells first before running a command [True or false]

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This command shutdowns or reboots the system

A

shutdown [time] [message]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Linux has a built-in account called?

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the account that is the super user in a Linux system

A

Root account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the user ID of the root account in /etc/passwd file?

A

o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you add a user as a sudoer?

A

by adding them in the sudo list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cron?

A

It allows an administrator or user to setup a program or application to be executed by the system at a specific time

17
Q

The root account has automatic access to the ‘cron’ utility [True or false]

A

True

18
Q

The ________ permission prevents non-root, non-owners from deleting a file or directory

A

Sticky bit permission

19
Q

How would you know if sticky bit permission is enabled in a directory or file?

A

list them and has ‘t’

20
Q

a web server provides support _____________

A

HTTP (Hyper Text Transfer Protocol)

21
Q

________ is a set of rules for communication between two computers

A

Protocol

22
Q

_________ is a textual, stateless protcol

A

HTTP

23
Q

This refers to all commands are plain text and human-readable

A

Textual

24
Q

This refers to neither the server nor the client remember previous communications

A

Stateless

25
Q

____________ Refers to protecting networks and computer systems from damage to or theft of software, hardware, or data.

A

Web Security

26
Q

What purpose does web security serve?

A

Maintains smooth operation of any business that uses computers and prevents hackers and malware from manipulating your systems

27
Q

These are threats involve malcious people and organizations as well as the tools they use to leverage the internet to infiltrate

A

Web security threats

28
Q

Give samples of web security attacks:

A

HTTP
Denial Of Service
No rate Limiting
No role base account
Misconfig/no backup

29
Q
A