Operating systems (9) Flashcards

1
Q

You have a MacBook Pro and need to run a critical application for work that is compatible only with Windows. Is there any way you can do this?

Yes. Macs will run Windows applications natively.

Yes. Use Boot Camp to install Windows and dual-boot.

Yes. Use Dock to install Windows and dual-boot.

A

Yes. Use Boot Camp to install Windows and dual-boot.

As great as MacOS is, there are times when you need Windows—for compatibility purposes with apps, legacy data, and many others. Because of this, you can use Boot Camp to install Windows on a Mac computer and then choose between operating systems as you boot. The Mac computer must be Intel-based, you need to have a 64-bit version of Windows, and you need a minimum of 30 GB of free disk space for it to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On a Linux workstation, which command do you use to display the contents of a directory?

grep

cp

ls

A

Is

The ls (list) command is used in Linux to show the contents of a directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are configuring your tablet computer to connect to your corporate email server. Which ports do you need to set up if you want to use SMTP with SSL and IMAP4 with SSL?

25 and 143

465 and 993

465 and 995

A

465 and 993

SMTP uses port 25, and IMAP4 uses port 143. However, when they run over SSL, SMTP uses port 465, and IMAP4 uses port 993. SMTP over TLS uses port 587, and POP3 over SSL or TLS uses port 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which command is used to change a file’s permissions in Linux?

chperm

chown

chmod

A

chmod

The chmod (change mode) command is used in Linux to change file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of update does your mobile phone need if you need to refresh the reference list the phone uses to connect to the proper cell phone tower when roaming?

PRL

PRI

Baseband

A

PRL

The Preferred Roaming List (PRL) is the reference guide the phone uses to connect to the proper cell phone tower when roaming. Product Release Instruction (PRI) contains settings for configuration items on the device that are specific to the network that it’s on. Both PRI updates and PRL updates normally happen when the primary OS on the phone is updated, but your carrier may let you update them manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your network uses a Linux file server. It has four volumes, each formatted with ext4. You want to check the /ops/files volume for any filesystem errors and fix them. Which command should you use?

fsck /ops/files

du /ops/files

df /ops/files

A

fsck /ops/files

The fsck (file system check) command is used to examine volumes for errors as well as attempt to fix them. The command is analogous to the chkdsk command for Windows-based computers. Be sure that the volume is unmounted before using fsck, to avoid corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network consultant recommended to your boss that you install an IPS. Which of the following statements best describes what an IPS does?

It detects anomalies in network traffic, logs the activity, and takes actions to stop the activity.

It detects viruses transmitted across the network, logs the activity, and deletes the network packets infected with the virus.

It detects anomalies in network traffic, logs the activity, and sends an alert to the administrator.

A

It detects anomalies in network traffic, logs the activity, and takes actions to stop the activity.

An intrusion prevention system (IPS) is an active device. It monitors network traffic, and when it detects an anomaly, it can take actions to attempt to stop the attack. For example, if it senses suspicious inbound traffic on a specific IP port, it can shut the port down, block the sender, or reset the TCP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which mobile operating system has versions named for types of candy or sweets?

BlackBerry OS

Android

iOS

A

Android

Android started off as its own company and was purchased by Google in 2005. Like Google’s Chrome OS, Android is Linux-based. It’s primarily installed on smartphones, but it is also found on specialized television, automobile, and wristwatch devices. Versions of Android are named after candy, such as Ice Cream Sandwich, Jelly Bean, KitKat, and Lollipop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the designers on your network has an iMac running OS X El Capitan. Which of the following is not considered necessary with this workstation?

Installing antivirus software

Updating drivers and firmware

Defragmenting the hard drive

A

Defragmenting the hard drive

Macs use the HFS+ file system, which Apple states does not require defragmentation as FAT or NTFS do. Therefore, disk defragmentation is not generally necessary. Regardless of the operating system, you should always back up data (unless you don’t mind losing it), install and update antivirus software, and keep drivers and firmware current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hich type of server on your network could have its functionality replaced with NAS or a SAN?

Mail server

File server

Print server

A

File server

File servers provide a central repository for users to store, manage, and access files on the network. Networks can also use network attached storage (NAS) devices, which are stand-alone units that contain hard drives, come with their own file management software, and connect directly to the network. If a company has extravagant data storage needs, it can implement a storage area network (SAN). A SAN is basically a network segment, or collection of servers, that exists solely to store and manage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have a MacBook Pro and want to share files with a small group of Mac users. Because your team edits the files frequently, you want to make sure everyone has access to the same version of the files online. What storage solution should you use?

iCloud

Finder

Remote Disc

A

iCloud

One of the best ways always to have the latest version of files, regardless of the device that you are using to access them, is to have them stored/accessed remotely. iCloud is Apple’s answer to remote storage, and you can configure your Apple devices to place files there automatically or use it for backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Linux workstation you are using seems slow. You want to see what processes are running on the computer. Which command should you use?

cp

dd

ps

A

ps

The ps (process status) command in Linux is used to show currently running processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are working on an iMac, and about a dozen applications are open. Which feature allows you to easily see all of them and switch to your desired application?

Spotlight

Mission Control

Finder

A

Mission Control

On a Mac, it’s possible to run a large number of things at one time, whether those things in question are apps or Windows Desktops. Apple’s Mission Control is an easy way to see what is open and switch between applications. To access Mission Control, you can press the Mission Control key on an Apple keyboard, click the Mission Control icon in Dock (or Launchpad), or swipe up with three or four fingers on a trackpad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are configuring your Android phone to synchronize with your Windows 8.1 workstation. Which of the following types of data will not be synchronized between the devices?

Passwords

Bookmarks

Email

A

Passwords

Passwords are not synchronized between devices. Types of data that are synchronized include contacts, programs, email, pictures, music, videos, calendar, bookmarks, documents, location data, social media data, and e-books

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your manager asked you to find a device for network security. He wants it to be able to perform packet filtering, shut down network attacks, block spam, and prohibit access to inappropriate websites. What type of device should you look for?

IPS

IDS

UTM

A

UTM

The goal of unified threat management (UTM) is to centralize security management, allowing administrators to manage all of their security-related hardware and software through a single device or interface. A UTM device can generally provide the following types of services: packet filtering and inspection, intrusion protection service, gateway anti-malware, spam blocking, malicious website blocking, and application control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An intern working to be a system administrator is helping a user with his Windows desktop. Opening a command window on the Windows Desktop, the intern attempts to run the System File Checker (SFC) utility. However, the utility fails to run. What is likely the problem?

SFC can run only from an administrator’s system.

SFC is not a Windows utility.

SFC requires administrative privileges to run.

A

SFC requires administrative privileges to run.

SFC is a command-line utility that requires administrative privileges to run

17
Q

One of your users has a MacBook Pro, and an application appears to have crashed. What can she use to force the app to close?

Task Manager

Force Quit

Shell/Terminal

A

Force Quit

When an app hangs inside the Mac OS, you can use Force Quit to force it to close. Most devices, whether running Mac OS or iOS, offer similar options. You get to Force Quit by looking at the Apple menu or by pressing Command+Option+Esc, which is analogous to pressing Ctrl+Alt+Del on a PC

18
Q

Where can a user find web and local credentials on a Windows 10 Desktop?

Web credentials are never stored by Windows 10.

Credentials can be managed in Credential Manager.

Credentials can be managed in MSInfo32.

A

Credentials can be managed in Credential Manager.

On a Windows 10 Desktop, a user can manage his credentials by opening Credential Manager, which is found in under Control Panel

19
Q

A user with an Android phone reports that it isn’t properly detecting where she touches the virtual keyboard—it seems to be a bit off. What should she do to resolve the issue?

Recalibrate the screen.

Turn the phone off and back on again.

Perform a reset to factory specifications.

A

Recalibrate the screen

Some mobile devices give you the option to improve the ability of the computer to recognize how you personally actuate the sensors. For example, many phones allow you to recalibrate (or retrain) the onscreen touch keyboard. That would be the first thing to try in this situation

20
Q

You call your cell phone provider to do some troubleshooting, and it tells you it needs the phone’s 15-digit serial number. What number is it looking for?

PRI

IMEI

IMSI

A

IMEI

The International Mobile Equipment Identity (IMEI) is a 15-digit serial number that is unique to each phone. If a phone is reported stolen, the IMEI will be declared invalid. The IMEI can be displayed on most phones by dialing *#06#. AT&T and T-Mobile were the first networks to use IMEI. The International Mobile Subscriber Identity (IMSI) is also a unique 15-digit identifier, but it describes a specific mobile user and his network

21
Q

You are updating user accounts on a Linux workstation and need to change a user’s password. Which command do you use to do this?

chperm

pwd

passwd

A

passwd

The passwd command is used in Linux to change user passwords. The similar-looking pwd command displays the current directory

22
Q

A user wants to perform a backup on his MacBook running OS X El Capitan. Which software utility should he use to do this?

Image Recovery

Time Machine

iBackup

A

Time Machine

The backup software for all current versions of MacOS is called Time Machine. It allows users to back up and restore files just like any other commercial backup software

23
Q

Which of the following mobile operating systems is an open-source OS?

Windows Phone

BlackBerry OS

Android

A

Android

Google offers the Android operating system to the mobile community under an open-source license. Apple and Microsoft keep their mobile OSs closed source, and they manage all the development and marketing of their operating systems. BlackBerry OS was closed source as well. Apps for mobile operating systems are created using a free software development kit (SDK). Android apps are installed using an Android application package (APK)

24
Q

The Linux commands kill and killall are used to kill running processes. Choose the correct answer that explains how they differ?

killall uses a process ID number

killall can send specific signals, but killall cannot

killall uses a process name

A

killall uses a process name

The commands kill and killall are used to terminate running processes. The biggest difference is, the kill command is followed by the process ID number. The killall command can terminate a named process