Operating systems (8) Flashcards
What command-line utility can help identify what DNS server the computer relies on?
nslookup
netstat
ping
nslookup
The utility nslookup will query the DNS server the computer is currently configured to use. The utility can be used to perform a variety of DNS queries
In Linux, what is the name of the interpreter between the user and the operating system?
Terminal
GUI
Shell
Shell
The shell is the interpreter between the user and operating system. The most popular shell for Linux today is Bash (an acronym for Bourne Again Shell), but csh (C-shell), ksh (Korn shell), and a number of others are also in use. The terminal is used to enter commands and interface with the shell
A user types in her username and password into a workstation that is configured in a domain. Which type of server examines her information and determines whether she gets access to network resources?
Authentication server
Proxy server
File server
Authentication server
An authentication server is a device that examines the credentials of anyone trying to access the network, and it determines whether network access is granted. Said another way, they are gatekeepers and critical components to network security. A common term that you will hear in the Microsoft world is domain controller, which is a centralized authentication server
On your network, a few users have been accessing material on inappropriate websites. What type of server can you install to block content from a list of prohibited websites?
DNS server
Proxy server
Web server
Proxy server
A proxy server makes requests for resources on behalf of a client. Proxy servers are known for three things. One, the proxy server can cache the information requested, speeding up subsequent searches. Two, the proxy can act as a filter, blocking content from prohibited websites. Three, the proxy server can modify the requester’s information when passing it to the destination, blocking the sender’s identity and acting as a measure of security; the user can be made anonymous
Which type of server on a network is responsible for listening for inbound traffic on ports 80 and 443?
DNS server
Mail server
Web server
Web server
Whenever you visit a web page, you are making a connection from your device (the client) to a web server. To be more specific, a connection is requested by your Internet software (generally a web browser) using the Hypertext Transfer Protocol (HTTP) of the TCP/IP protocol suite. Your client needs to know the IP address of the web server, and it will make the request on port 80. Secure web connections are made using Hypertext Transfer Protocol Secure (HTTPS) and port 443
You are working on a Linux file server. Which command would you use to see the amount of free disk space on a volume?
fsck
df
du
df
The df (disk free) command is used to show free and used disk space on a volume. The du (disk usage) command is used to show disk usage per directory
In your web browser, you type www.google.com and press Enter. Which type of server identifies the owner of that name and tells your computer the IP address of the server you want to communicate with?
Proxy server
DHCP server
DNS server
DNS server
DNS has one function on the network, and that is to resolve hostnames to IP addresses. For a computer or phone to open a website, it needs to know the IP address of that website. The URL www.google.com means nothing to it. When a user enters the URL, the computer needs to figure out what the address is. The DNS server provides the answer, “That is 72.14.205.104.” Now that the computer knows the address of the website that the user wants, it’s able to go find it
You wish to create a script that maps a drive. What command allows you to map a network drive to either a computer name or IP address?
net user
net use
netstat
net use
Mapping a network drive can be done at the command prompt by using the net use command
Which piece of software on a mobile phone manages all wireless communication for the phone?
PRI
PRL
Baseband OS
Baseband OS
Most mobile phones have three operating systems. The first is the primary OS, such as iOS or Android. Second, there is the baseband OS that manages all wireless communication, which is actually handled by a separate processor. Third, a subscriber identity module (SIM) OS manages all data transfers between the phone and the SIM chip, which is a small memory chip that stores user account information, phone identification, and security data, and it is generally tied to a specific carrier. Some people will call the wireless communications chips in a mobile phone the radio or the modem. Consequently, you might hear about radio firmware, a radio firmware update, or a modem update. The last two terms are interchangeable with baseband update, which simply means an update of the baseband OS
You have a MacBook running MacOS Yosemite on your network. You want to create a backup of critical operating system files in case the system crashes and is unable to locate the hard drive. What should you create?
Recovery disk
Image
Snapshot
Recovery disk
Mac OS X Yosemite has the ability to create a recovery disk using the Recovery Disk Assistant. This can be used to boot the system in the event of a hard drive problem and to attempt to recover the hard drive
A user recently left the company, and you need to change ownership of his files on the Linux server to a new user. Which command should you use to do this?
chown
chmod
chperm
chown
The chown (change owner) command is used to change ownership of files in Linux
One of your network users has a MacBook Pro running OS X Yosemite. Where should this user go to see whether there are any OS updates available?
Open the App Store and click Updates in the toolbar.
Open Safari and click Updates in the toolbar.
Open System Preferences and click Updates in the toolbar.
Open the App Store and click Updates in the toolbar.
Updates to MacOS Yosemite can be found at the App Store. Open it, and click Updates in the toolbar to see which updates are available. There will be an Install button to begin the installation. In System Preferences, there is generally a Software Update icon to help with updates as well
Which two commands are used in Linux to check or modify network configuration settings? (Choose two.)
ipconfig
ifconfig
iwconfig
inconfig
ifconfig
iwconfig
The ifconfig command is used to view and change network settings, whereas iwconfig is used to view and change wireless network settings. The ipconfig command is used in Windows
You want to enable data synchronization for your iPhone. Which two statements are true regarding Wi-Fi synchronization? (Choose two.)
You must enable Sync over Wi-Fi within iTunes.
You can sync to iCloud only over Wi-Fi.
The iPhone should be plugged into a USB port.
The iPhone and computer must be on the same network SSID.
You must enable Sync over Wi-Fi within iTunes.
The iPhone and computer must be on the same network SSID.
There are two ways to sync an iPhone: using Wi-Fi and using a USB connection. If you are going to use Wi-Fi, it must first be enabled in iTunes. The device should not be plugged into a USB port because that will take precedence over the Wi-Fi connection. Both devices must be on the same network SSID
In Linux, the command to add a user is useradd. What is the equivalent command-line utility on a Microsoft Windows platform? (Choose two)
adduser
netadd user
net user
net users
net user
net users
Both the commands net user and net users will perform the function to add or remove a user account on a Microsoft Windows system
Which type of server will extensively use ports 25 and 143 in its communications with clients on the network?
Print server
Mail server
DHCP server
Mail server
Email is critical for communication, and mail servers are responsible for sending, receiving, and managing email. There are three primary email protocols used today: SMTP (port 25), POP3 (port 110), and IMAP4 (port 143)
You are working on a Linux workstation. A file named docs needs to be renamed to newdocs. What is the right command to execute this?
ren docs newdocs
mv docs newdocs
cp docs newdocs
mv docs newdocs
In Linux, the mv (move) command is used to rename files. The cp command copies a file, but that is a different process than moving it. rm is short for remove, and it deletes files. ren is a DOS or Windows command to rename files
You want to download applications for a device running iOS. Where will you download them from?
Google Play
App Store
Windows Store
App Store
Apple produces iOS, and all of its apps can be found on the App Store. Google Play is used for Android-based devices, and it replaced Android Market. Windows Phone apps are found at the Windows Store
You are at a Linux workstation and need to search for text within several files. Which command should you use?
sudo
grep
cp
grep
The grep command (short for the impossibly long “globally search a regular expression and print”) does just what it says it does: It searches for a string of text and then displays the results of what it found
One of your network users has a MacBook Pro running OS X Mavericks. She asks you about installing or updating antivirus software. What should you tell her?
Use the free MacAntiVirus program that comes with the OS and set it to update automatically.
Install a commercial antivirus program and set it to update automatically.
Install a host-based firewall and set it to update automatically.
Install a commercial antivirus program and set it to update automatically.
It’s a fairly common myth that there are no MacOS viruses out there. The reality is that every operating system can be affected by malware. Because of this, it is imperative to have protection on every machine. Additionally, this protection—in the form of definition files—must be kept current and up-to-date. The best way to do that is to set the software to automatically update
The MacBook you are using does not have a built-in DVD player, but you need to access some files stored on one. Which MacOS feature allows you to access the DVD player on another computer?
Remote Disc
Finder
Spotlight
Remote Disc
The Remote Disc feature lets you access files on a CD or DVD installed in one machine on a remote machine. This is handy if you need to retrieve files from a disc and the workstation at which you are sitting does not have a built-in drive
For most command-line utilities on a Microsoft Windows system, how does the user find out which command switches exist or which parameters are necessary for that command? (Choose two.)
By typing: man [command]
By typing: more [command]
By typing: [command] /help
By typing: man [command] /?
By typing: [command] /help
By typing: man [command] /?
By appending the forward slash and question mark to nearly all commands at a Windows command prompt, you will be provided the expected usage and available options. For most commands now, the forward slash and help will also provide available options. By appending other words, it is also likely the command will fail with “Bad option” and display available options, too
You are working on a MacBook Pro and need to search the computer for a document you wrote a few months ago. Which feature should you use to search the hard drive?
KeyChain
SpotLight
Finder
Spotlight
The search feature within MacOS is Spotlight, and a magnifying glass icon in the upper-right corner of the menu bar represents it (or you can press Command+spacebar from any app). Spotlight can search for documents, images, apps, and so on