SysAdmin Test 2 Flashcards

1
Q

If you don’t have the easy to install rails that snap into place, I said you may have to use these pesky little clips that you can then put a screw into for holding the rails and/or mounting the equipment.

A

Cage Nut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you make a share a “hidden” share?

A

Add a $ to the end of the share name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The commands we have run in the terminal to interact with Active Directory are actually commandlets from this scripting language.

A

Powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The special “folders” within Active Directory Users and Computers that we created to organize our user and computer accounts.

A

Organizational Units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the RAID Level with its common Name / Descriptor

A

Striping – RAID-0

Mirroring – RAID-1

Striping with Parity – RAID-5

Striping with Dual Parity – RAID-6

Striping with Mirroring – RAID-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are basically just extra long surge strips made to be mounted in a rack…

A

PDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At the security tab of the properties window for a folder on Windows, you are editing these permissions.

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What “heavy” unit filled with lead batteries is typically installed in the bottom of a rack?

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connecting a share to a drive letter (e.g. S:\ ) on Windows is known as doing this…

A

Mapping a network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a printer is named HPLJ2600N, what type of naming schema is being used?

A

Descriptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is an issue that your Namespace Policy should address?

A

What if 2 users have the same first / last name?

How soon can a username be reused?

What geographical locations will use this namespace?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a machine is named PC-153 where 153 refers to the last octet of its IP address, this would be an example of what naming schema?

A

Formulaic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is something your Namespace Policy should answer?

A

What names are permitted?

What names are not permitted?

When is renaming allowed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a unique key for user accounts within Active Directory?

A

Race

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Namespaces need Policies, Procedures, and Centralized Management. What offers the latter on a Windows domain?

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If I name my web server web1, then I am using what naming schema?

A

Functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If a printer is named HPLJ2600N, what does the N stand for?

A

Networked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If I decide to name the servers on my domain after Lord of the Rings characters, then I am using what naming schema?

A

Thematic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of these is a unique identification number that is used behind the scenes on a Windows machines and within Active Directory to refer to user accounts.

A

SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the predominant form factor for servers?

A

Pizza Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When might you consider purchasing a support contract with short time to deliver critical components?

A

One critical system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is true about the Business line of workstations?

A

Designed for TCO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following would NOT be a consideration for a machine room?

A

Janitorial access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the most failure prone piece of hardware in servers?

A

Hard Drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

If your entire server room is populated with Dell Poweredge 2950’s then you are said to have a ___________ layout.

A

Homogenous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What term refers to hardware that can be plugged in AND brought online without rebooting a server?

A

Hot Swap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What device is used to control an entire rack’s worth of server equipment with one set of peripherals?

A

KVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is one of the main features of server systems opposed to business and home workstations?

A

Maximize uptime with redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is NOT a benefit of a server appliance?

A

Generic Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which the following TWO web server services are currently the most widely used across the internet and are both open source software?

A

Apache, NGINX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the name of the service that we are utilizing for managing user authentication in class?

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following considerations for rolling out a new service is NOT true?

A

Trust vendors for all load testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This term refers to the delay before data is received and is an important measurement for how well a service will scale.

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is one of the most fundamental services after network connectivity?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When making a DNS request to a domain name that has not already been resolved, where does a machine look first?

A

Hosts File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is NOT true about services?

A

On Linux, they are called Datoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is used to reach a compromise between what users want and what I.T. can provide?

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Breakdown of a core component causing cascading failures with other services is known as…..

A

Chain of reliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What approach should be followed for rolling out a new service as well as patch management?

A

One, Some, Many

40
Q

This term refers to a server layout of all the same model

A

Homogenous

41
Q

This term refers to servers having multiple pieces of hardware such that one can fail and the server is fine; it will continue running and operating normally

A

Redundant

42
Q

This is the most failure prone piece of hardware in servers

A

Hard drive

43
Q

If you have a critical server that you want to make sure the vendor can get you parts in a very short timeframe should it go down, you will want to purchase one of these

A

Maintenance Contract

44
Q

This is the service we use in class to provide authentification

A

Active Directory

45
Q

This is the name for a service on a *nix system

A

Daemon

46
Q

This essential service is used any time you need to resolve a hostname

A

DNS

47
Q

If I wanted to redirect someone to a malicious website and I had access to their machine, I could alter this local file.

A

Hosts

48
Q

Namespace policies are best this; not oral

A

Written

49
Q

This namespace schema uses names from a particular arena such as characters or planets from a movie or TV show

A

Thematic

50
Q

Name one of the three items that your namespace policies should cover

A

-What names are permitted
-What names are NOT permitted
-When is re-naming allowed

51
Q

Namespaces require policies, procedures, and this which Active Directory provides for us

A

Centralized Management

52
Q

If I name things after a strict set of rules such as B for Bradford and then the last two octets of the IP address, I am using this naming schema

A

Formulaic

53
Q

This term refers to software that is nearing public release but may still contain some bugs and should NOT be used in production systems

A

Beta

54
Q

This hard drive storage technology uses actual physical/spinning disks to store the information

A

Platter

55
Q

This term refers to when a vendor will no longer support a product; either software OR hardware

A

End of Life [EoL]

56
Q

When you are physically in front of a system and log into it, you are said to be gaining this type of access

A

Console

57
Q

When you have to consider all user and group permissions to determine what a particular user can do with a folder/file you are determining these

A

Effective Permissions

58
Q

What is the name of Microsoft’s hypervisor that we use in class?

A

Hyper-V

59
Q

This file type contains the entire contents needed to boot a VM or create installation media for a physical machine

A

ISO File

60
Q

What is the name of a server that is part of a domain, but not a domain controller?

A

Member Server

61
Q

What type of chip does a Windows machine require thatwas not necessary for previous versions of Windows?

A

TPM

62
Q

When creating a Windows image to deply to other machines, this is the mode you want it to boot into on first boot so you can create your first initial user, name the machine, and otherwise do initial configuration of the system

A

OOBE

63
Q

This RAID set is known as mirroring

A

RAID-1

64
Q

This RAID set is fast as it can read/write to two disks at once, but lose one drive and you lose all your data

A

RAID-0

65
Q

This RAID set takes advantage of Striping and Mirroring to give you both speed and redundancy

A

RAID-10

66
Q

This RAID set is known as striping with parity

A

RAID-5

67
Q

This RAID set requires at least 5 drives but has enough parity to lose drives without losing any of your data

A

RAID-6

68
Q

This RAID set is often used for the operating system drive in servers because it requires just 2 drives, but th server will continue running unaffected if one fails

A

RAID-1

69
Q

Time savings, vendor support, and unique features are all something you get by going with one of these over building one yourself

A

Server appliance

70
Q

This is the pricing metric that servers are built around

A

Cost per performance

71
Q

This type of server supplies a main chassis and takes cards with resources such as processors and RAM to expand your loadout

A

Blade server

72
Q

These are the two main types of hard drive interfaces that modern servers accept

A

SAS and SATA

73
Q

This term refers to how much data can be transferred in one second

A

Bandwidth

74
Q

This term refers to the delay [in time] before data is received

A

Latency

75
Q

This is the Microsoft web server that is a built-in file for Windows Server

A

IIS

76
Q

This service is responsible solely for sending e-mail

A

SMTP

77
Q

This is the program that I said we use on campus to monitor servers and services

A

Nagios

78
Q

The default first user that gets created on a Windows Server install

A

Admin

79
Q

Name one of the two types of storage devices that can be attached to a network to provide a massive amount of storage

A

NAS or SAN

80
Q

The equivalent of an admin on a unix/linux system

A

Root

81
Q

This is what BIOS stands for

A

Basic Input/Output System

82
Q

This is what UEFI stands for

A

Unified Extensible Firmware Interface

83
Q

This is the colloquial term for a standard rack mountable server form factor

A

Pizza box

84
Q

When editing permissions on the security tab in Windows Ecplorer you are editing these specific permissions

A

NTFS

85
Q

This term refers to booting a machine off the network; like when you image using the FOG server

A

PXE or “pixie” booting

86
Q

You can control the default password setting for your domain through one or more, of these

A

Group Policy Objects

87
Q

Every major vulnerability that gets reported is assigned one of these numbers

A

CVE

88
Q

What is the default window that opens up when you log into a Windows Server?

A

Server Manager

89
Q

What is the name of the command that can be used to prepare a Windows machine to have an image captured from it?

A

sysprep

90
Q

What group do you add a user to so that they will have admin privileges domain wide?

A

Domain Admins

91
Q

What term refers to a specific “flavor” of linux?

A

Distribution

92
Q

What term refers to a special container in Active Directory that a Group Policy Object can be applied to?

A

Organizational Unit

93
Q

Pizza box servers are made to mount racks with this many posts

A

Four

94
Q

The metal extendable pieces that servers mount into and allows them to slide in and out of the rack

A

Rails

95
Q

The numbers that are on the posts of the rack are known as

A

Rack Units

96
Q

The UPSes you will find in most server racks have batteries comprised primarily of this heavy element

A

Lead

97
Q

The small clips that you must use to mount server equipment if it isn’t the nice easy snap in type

A

Cage Nuts