Operating systems (8) Flashcards

1
Q

What command-line utility can help identify what DNS server the computer relies on?

nslookup

netstat

ping

A

nslookup

The utility nslookup will query the DNS server the computer is currently configured to use. The utility can be used to perform a variety of DNS queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Linux, what is the name of the interpreter between the user and the operating system?

Terminal

GUI

Shell

A

Shell

The shell is the interpreter between the user and operating system. The most popular shell for Linux today is Bash (an acronym for Bourne Again Shell), but csh (C-shell), ksh (Korn shell), and a number of others are also in use. The terminal is used to enter commands and interface with the shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user types in her username and password into a workstation that is configured in a domain. Which type of server examines her information and determines whether she gets access to network resources?

Authentication server

Proxy server

File server

A

Authentication server

An authentication server is a device that examines the credentials of anyone trying to access the network, and it determines whether network access is granted. Said another way, they are gatekeepers and critical components to network security. A common term that you will hear in the Microsoft world is domain controller, which is a centralized authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On your network, a few users have been accessing material on inappropriate websites. What type of server can you install to block content from a list of prohibited websites?

DNS server

Proxy server

Web server

A

Proxy server

A proxy server makes requests for resources on behalf of a client. Proxy servers are known for three things. One, the proxy server can cache the information requested, speeding up subsequent searches. Two, the proxy can act as a filter, blocking content from prohibited websites. Three, the proxy server can modify the requester’s information when passing it to the destination, blocking the sender’s identity and acting as a measure of security; the user can be made anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of server on a network is responsible for listening for inbound traffic on ports 80 and 443?

DNS server

Mail server

Web server

A

Web server

Whenever you visit a web page, you are making a connection from your device (the client) to a web server. To be more specific, a connection is requested by your Internet software (generally a web browser) using the Hypertext Transfer Protocol (HTTP) of the TCP/IP protocol suite. Your client needs to know the IP address of the web server, and it will make the request on port 80. Secure web connections are made using Hypertext Transfer Protocol Secure (HTTPS) and port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are working on a Linux file server. Which command would you use to see the amount of free disk space on a volume?

fsck

df

du

A

df

The df (disk free) command is used to show free and used disk space on a volume. The du (disk usage) command is used to show disk usage per directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In your web browser, you type www.google.com and press Enter. Which type of server identifies the owner of that name and tells your computer the IP address of the server you want to communicate with?

Proxy server

DHCP server

DNS server

A

DNS server

DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. The URL www.google.com means nothing to it. When a user enters the URL, the computer needs to figure out what the address is. The DNS server provides the answer, “That is 72.14.205.104.” Now that the computer knows the address of the website that the user wants, it’s able to go find it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You wish to create a script that maps a drive. What command allows you to map a network drive to either a computer name or IP address?

net user

net use

netstat

A

net use

Mapping a network drive can be done at the command prompt by using the net use command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which piece of software on a mobile phone manages all wireless communication for the phone?

PRI

PRL

Baseband OS

A

Baseband OS

Most mobile phones have three operating systems. The first is the primary OS, such as iOS or Android. Second, there is the baseband OS that manages all wireless communication, which is actually handled by a separate processor. Third, a subscriber identity module (SIM) OS manages all data transfers between the phone and the SIM chip, which is a small memory chip that stores user account information, phone identification, and security data, and it is generally tied to a specific carrier. Some people will call the wireless communications chips in a mobile phone the radio or the modem. Consequently, you might hear about radio firmware, a radio firmware update, or a modem update. The last two terms are interchangeable with baseband update, which simply means an update of the baseband OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a MacBook running MacOS Yosemite on your network. You want to create a backup of critical operating system files in case the system crashes and is unable to locate the hard drive. What should you create?

Recovery disk

Image

Snapshot

A

Recovery disk

Mac OS X Yosemite has the ability to create a recovery disk using the Recovery Disk Assistant. This can be used to boot the system in the event of a hard drive problem and to attempt to recover the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user recently left the company, and you need to change ownership of his files on the Linux server to a new user. Which command should you use to do this?

chown

chmod

chperm

A

chown

The chown (change owner) command is used to change ownership of files in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of your network users has a MacBook Pro running OS X Yosemite. Where should this user go to see whether there are any OS updates available?

Open the App Store and click Updates in the toolbar.

Open Safari and click Updates in the toolbar.

Open System Preferences and click Updates in the toolbar.

A

Open the App Store and click Updates in the toolbar.

Updates to MacOS Yosemite can be found at the App Store. Open it, and click Updates in the toolbar to see which updates are available. There will be an Install button to begin the installation. In System Preferences, there is generally a Software Update icon to help with updates as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two commands are used in Linux to check or modify network configuration settings? (Choose two.)

ipconfig

ifconfig

iwconfig

inconfig

A

ifconfig

iwconfig

The ifconfig command is used to view and change network settings, whereas iwconfig is used to view and change wireless network settings. The ipconfig command is used in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You want to enable data synchronization for your iPhone. Which two statements are true regarding Wi-Fi synchronization? (Choose two.)

You must enable Sync over Wi-Fi within iTunes.

You can sync to iCloud only over Wi-Fi.

The iPhone should be plugged into a USB port.

The iPhone and computer must be on the same network SSID.

A

You must enable Sync over Wi-Fi within iTunes.

The iPhone and computer must be on the same network SSID.

There are two ways to sync an iPhone: using Wi-Fi and using a USB connection. If you are going to use Wi-Fi, it must first be enabled in iTunes. The device should not be plugged into a USB port because that will take precedence over the Wi-Fi connection. Both devices must be on the same network SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In Linux, the command to add a user is useradd. What is the equivalent command-line utility on a Microsoft Windows platform? (Choose two)

adduser

netadd user

net user

net users

A

net user

net users

Both the commands net user and net users will perform the function to add or remove a user account on a Microsoft Windows system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of server will extensively use ports 25 and 143 in its communications with clients on the network?

Print server

Mail server

DHCP server

A

Mail server

Email is critical for communication, and mail servers are responsible for sending, receiving, and managing email. There are three primary email protocols used today: SMTP (port 25), POP3 (port 110), and IMAP4 (port 143)

17
Q

You are working on a Linux workstation. A file named docs needs to be renamed to newdocs. What is the right command to execute this?

ren docs newdocs

mv docs newdocs

cp docs newdocs

A

mv docs newdocs

In Linux, the mv (move) command is used to rename files. The cp command copies a file, but that is a different process than moving it. rm is short for remove, and it deletes files. ren is a DOS or Windows command to rename files

18
Q

You want to download applications for a device running iOS. Where will you download them from?

Google Play

App Store

Windows Store

A

App Store

Apple produces iOS, and all of its apps can be found on the App Store. Google Play is used for Android-based devices, and it replaced Android Market. Windows Phone apps are found at the Windows Store

19
Q

You are at a Linux workstation and need to search for text within several files. Which command should you use?

sudo

grep

cp

A

grep

The grep command (short for the impossibly long “globally search a regular expression and print”) does just what it says it does: It searches for a string of text and then displays the results of what it found

20
Q

One of your network users has a MacBook Pro running OS X Mavericks. She asks you about installing or updating antivirus software. What should you tell her?

Use the free MacAntiVirus program that comes with the OS and set it to update automatically.

Install a commercial antivirus program and set it to update automatically.

Install a host-based firewall and set it to update automatically.

A

Install a commercial antivirus program and set it to update automatically.

It’s a fairly common myth that there are no MacOS viruses out there. The reality is that every operating system can be affected by malware. Because of this, it is imperative to have protection on every machine. Additionally, this protection—in the form of definition files—must be kept current and up-to-date. The best way to do that is to set the software to automatically update

21
Q

The MacBook you are using does not have a built-in DVD player, but you need to access some files stored on one. Which MacOS feature allows you to access the DVD player on another computer?

Remote Disc

Finder

Spotlight

A

Remote Disc

The Remote Disc feature lets you access files on a CD or DVD installed in one machine on a remote machine. This is handy if you need to retrieve files from a disc and the workstation at which you are sitting does not have a built-in drive

22
Q

For most command-line utilities on a Microsoft Windows system, how does the user find out which command switches exist or which parameters are necessary for that command? (Choose two.)

By typing: man [command]

By typing: more [command]

By typing: [command] /help

By typing: man [command] /?

A

By typing: [command] /help

By typing: man [command] /?

By appending the forward slash and question mark to nearly all commands at a Windows command prompt, you will be provided the expected usage and available options. For most commands now, the forward slash and help will also provide available options. By appending other words, it is also likely the command will fail with “Bad option” and display available options, too

23
Q

You are working on a MacBook Pro and need to search the computer for a document you wrote a few months ago. Which feature should you use to search the hard drive?

KeyChain

SpotLight

Finder

A

Spotlight

The search feature within MacOS is Spotlight, and a magnifying glass icon in the upper-right corner of the menu bar represents it (or you can press Command+spacebar from any app). Spotlight can search for documents, images, apps, and so on