Kahoot Questions Flashcards

1
Q

Server resources are automatically allocated as they are needed and removed when not, is called ______.

A

Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The operating system that makes use of container-based virtualization is the ____ OS.

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A combination of software applications and an OS tricked into thinking it has its own dedicated hardware is called ____

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtualization is a way for software apps to share ___ resources so each ___ product can function as if it had control.

A

Hardware
Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The virtualized environment resides on the host____

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which architecture utilizes a hypervisor that oversees hosting a dedicated OS for each client individually?

A

Virtual Desktop Infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which architecture stores a user’s profile, settings and data in a centralized data center or cloud infrastructure?

A

User Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of server virtualization has the hypervisor emulate hardware that it presents to the guest VM?

A

Hardware emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Application virtualization allows many users to simultaneously access the same application installed on a central server.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which virtualization application protects against single point of failure issues?

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What virtualization method refers to products and processes helping IT Organizations respond to catastrophic situations?

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where is the virtualization software installed on Bare-Metal virtualization?

A

Directly on the machine hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security capabilities of the underlying technologies and the assurances they provide must be understood by the ________.

A

Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Changes can affect three fundamentals of security composed of as confidentiality, availability and __________.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where are changes tested to ensure the change does not adversely affect either the host or guest operating systems?

A

Staging Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To maintain an operational, efficient, and secure network, what should be monitored?

A

Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hardware requirements for the _______device are dependent upon the number and roles of the VMs it will be managing.

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The amount of ______ power and memory are the main factors limiting the number of VMs that a host can support.

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: The number of network interface cards (NIC) on the host server vary based on the VM’s tasks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do users interact with the host server to make software and system configurations?

A

Keyboard, Monitor, Mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which network model allows every computer to communicate with every other computer without the use of a server?

A

Peer-to-Peer (Non-dedicated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which network model is designed for clients to access network resources from a server?

A

Client-Server (Dedicated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A computing device that initiates contact with a server to make use of a shared resource is called_______

A

A Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a desktop terminal device that has no hard drive installed?

A

Thin Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
True or False: A thick client is also referred to as a fat or rich client.
True
26
True or False: A computer that is either connected or not connected to a network is often called a workstation.
True
27
What is the biggest advantage of implementing a client-server network model?
Central management of the network
28
What are the two methods of server network control?
Workgroups and Domains
29
True or False: Peer-to-Peer networks are known as Domains.
False
30
What type of server allows administrators to manage and store info about resources on a network?
Active Directory
31
What type of server automatically assigns each computer an IP address from a list of available addresses?
Dynamic host configuration protocol (DHCP)
32
What type of server acts as a mediator between a client and an external server?
Proxy
33
True or False: A server at another location and shared by multiple web site owners is a virtual server.
True
34
What type of server enables users to remotely log on to a host computer and execute tasks?
Telnet
35
What is a list organizing resources and associates with their characteristics?
Directory
36
What is a hierarchical directory service used for managing permissions and user/group access to network resources?
Active Directory
37
Active Directory is divided into logical and ______ structures for grouping network components.
physical
38
Which is not one of the nine components of Active Directory’s logical structure?
Branch
39
Where is the Active Directory information segregated and logically stored?
Directory Partition
40
What Active Directory resource consists of a set of object classes, attributes, and syntaxes?
Schema
41
In Active Directory, what defines the type of information that an object can hold?
Attributes
42
What AD structure is a group of users, servers and other resources sharing a database of account and security info?
Domain
43
True or False: A collection of one or more domains that share a common name space is a domain bush.
False
44
What is at the top of the Active Directory structure and consists of one or more domain trees?
Forest
45
This is the first forest created in an Active Directory structure.
Forest Root
46
Domains created after the forest root are known as ___________ domains?
Child
47
A subdivision in Active Directory where you can place users, groups, or computers is called an organizational unit.
True
48
A single user/computer and its attributes in Active Directory are represented by an ________.
Object
49
What is the end point of a branch in Active Directory?
Leaf
50
What maps the physical structure of a network?
Site
51
True or False: Authenticating users, enforcing policy and replication are the responsibilities of the Domain Controller.
True
52
The global catalog server is part of Active Directory’s _________ structure.
Physical
53
Domain _________ allows files and other resources on the member server to be shared.
Security
54
A computer that has an account in Active Directory is known as a
Domain Client
55
Locating networked computers by resolving computer names to IP addresses is the purpose of _______.
DNS
56
True or False: Any host or client on the internet needing to look up domain information is a resolver.
True
57
In a DNS database, files called zones contain ___________ records.
Resource
58
Which name server does not contain any zone information?
Cache-only Name Server
59
The Forward look up zone in the DNS name space resolves the __________.
Host name to an IP address.
60
What does a Reverse look up zone in the DNS name space resolve?
IP address to host name.
61
This zone database file is stored as a standard text file.
Primary zone database
62
What zone database file is stored as a read only text file?
Secondary zone database
63
Which is not a type of DNS query?
Non-iterative
64
A DNS client provides a host name, and the DNS resolver “must” provide an answer. This is query is called a/an ________.
Recursive query
65
A DNS client provides a host name, and the DNS resolver returns the “best” answer it can is a/an ________ query.
Iterative
66
A response is immediately returned to the client because the record is stored in a local cache is a _________ query.
Non-recursive
67
What is designed to reduce configuration time for TCP/IP networks by automatically assigning IP addresses to clients?
DHCP
68
A range of IP addresses that a DHCP server can lease out is a DHCP _______
Scope
69
True or False: Starting and ending IP addresses are to be excluded from the scope during creation.
True
70
True or False: When there is two or more DHCP servers, they will share their databases of leased IP address.
False
71
The duration for which a DHCP server loans an IP address to DHCP client is a DHCP _______.
Lease
72
What is the default time to live (TTL) value for a leased IP address?
3 days
73
What is the four-step process for obtaining a DHCP lease for an IP address?
DORA
74
What is the first step in the DHCP Process?
Discover
75
When in the DHCP process does the client broadcast a request to lease an address from the offering DHCP server?
Request
76
What is the next step in the DHCP process after the client has been offered an address?
Request
77
The DHCP server assigns the IP address to a device during which DHCP step?
Acknowledge
78
Software solutions that improve the speed, security, and operability of applications are application ______.
Services
79
In Linux, application services are called _______.
Daemons
80
Application Services run in the __________ and are __________ with the user.
background, not interactive
81
What are the two main ways in Windows to view system Services? (Select 2)
Microsoft Management Console (MMC.exe) Windows Task Manager
82
Which windows service speeds up OS and application startup by caching frequently used files, and app. components?
Prefetch and Superfetch
83
Which windows service enables the use of one device connected to the internet as an access point for other devices?
Internet Connection Sharing Service
84
Which Windows service makes it possible to create applications that manage the remote access and routing capabilities?
Routing and Remote Access
85
What is the component responsible for managing Windows services?
Service Control Manager
86
True or False: Service Control Manager database includes information on how each service or driver service should be started.
True
87
Windows admins manage services through _______.
All of the above (Windows Powershell, Task Manager, MMC.exe)
88
This windows server utility consists of seven tabs including services.
Task Manager
89
How do you know when a service is started in Microsoft Management Console?
Service is visible.
90
A __________is simply an executing program developed for the end user.
process
91
True or False: Any process can be deleted with no impact to your system.
False
92
Server processes are typically initiated as a/an __________ process on the server.
Automated
93
Processes that run in the __________ or_________ can be initiated by a command using the WAIT=YES parameter.
foreground, synchronously
94
What type of process activates, generates, and executes tasks, and monitor them until they are finished?
Work
95
The work process that starts first determines the _________ work process.
Primary
96
Communication between agents and User Interfaces is exclusively performed through the ______processes.
Communication
97
The__________ tab in Task Manager gives insight into how programs are using system resources.
Processes