Test 3 16-18,20 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Most android apps are weird. Using ______\ using the Android software developer kit

A

Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WhT are the names of the app stores for iOS and Google Android devices

A

Google Play

Apple store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device used in mobile devices to sense the physical position of the device

A

Accelerometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An area where access to Wi fi is made available such as at a coffee shop, retail store, or airport

A

Hotspot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A device that contains a disc that is free to move and can respond to gravity as device is moved

A

Gyroscope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Based on Mac OS X and is currently used on the iPhone IPad and iPod touch by Apple

A

iOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A feature that uses Bluetooth to detect t nearby compatible devices then creates a peer to peer network using a WiFi signal between the devices.

A

AirDrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows a task to be started on a device such as an iPad and the. Pick up that task on another device.

A

Handoff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A unique number that identifies a cellular subscription for a device or subscriber along with its home country and mobile network.

A

IMSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A unique number that identifies each mobile phone or tablet device worldwide

A

IMEI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of connecting with another Bluetooth device

A

Pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What software programming languages can be used for an iOS app

A

C++
C
Objective-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For iOS a ______ reset is a full shutdown of the device

A

Hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The iOS operating system utilizes a closed source or vendor specific commercial license. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ is the process of obtaining administrative privileges to an Android device

A

Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A database file called the _______ contains the preferred service providers or radio frequencies a mobile carrier wants a device to use.

A

Preferred Roaming List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where is the favorites tray on an Android Device

A

Above the Action Bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A setting called airplane mode lowers the output power of the WiFi and Bluetooth antennas allowing these networks to function but at a reduced range. True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What must you do before using a new IPad or IPod touch

A

Activate it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CDMA carriers are likely to require that a cellular device have a ________ which is a small card similar to a SIM card

A

Removable User Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Outgoing mail is normally sent using what mail delivery protocol?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What name is given to Windows 8.1 virtual assistant?

A

Cortana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the more secure alternative to the SMTP protocol?

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Windows phones rely primarily on the ______ screen for accessing apps

A

Start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The official source for Android apps is called the Android ______ at play.google.com

A

Marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A factory reset erases all data and restores a device to factory default state. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Like desktop computers a mobile device can be configured to communicate information securely over a —————- network connection

A

Virtual private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A SIM card is used for what?

A

Holding data related to your cellular carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What identifies a SIM card if the card is used?

A

ICCID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Each android version is named after a what?

A

Dessert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Android offers a ________ for troubleshooting OS and device issues

A

Safe mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

For iOS a ________ reset puts the device in hibernation and then restarts the device

A

Soft reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

For Android a ______ reset aka factory reset restores the device to factory default state.

A

Hard reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What port is utilized by secure IMAP

A

993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

All parts of an adroit application are published as package of files wrapped into one file utilizing a what file extension?

A

.apk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A process called _________ allows users to download software from sources other than Apple

A

Jail breaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Developers can write apps for iPhone but these apps must be sent to Apple for their close scrutiny. True or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

iOS was developed by and continues to be maintained by a consortium of companies. True or false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What company acquired android code in 2005?

A

Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Up to _____ apps can be pinned to favorites tray on Android phones.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Sprint and t mobile offer a feature called WiFi ________ which uses voIP over a WiFi connection to the internet.

A

Calling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

For Android a _____ reset is power cycling the device

A

Soft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A Bluetooth pin code requires the entry of a pin that is how many digits in length?

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The Fire OS used by Amazons kindle fire device is based upon ______ and is deeply customized to meet the needs of Amazons e reader audience.

A

Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

________ your computer can use a phones cellular network connection to access the internet.

A

Tethering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Android apps are sold or freely _______ from any source or vendor

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the accelerometer used for in mobile devices?

A

Adjusting the screen orientation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Siri is an example of what technology?

A

Virtual assistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are two most popular web server applications?

A

IIS and Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

To which group does windows give access to folders that you create which are not part of your user profile?

A

Authenticated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The easiest method to start a remote assistance connection but only works if both computers used for the connection support the feature.

A

Easy Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

If you want to share a folder but don’t want others to see it add a ____ to the end of the folder name

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The authentication server stores user or device ______ such as usernames and passwords.

A

Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Remote _______ gives a user access to a windows desktop from anywhere on the internet.

A

Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Group policy is available in all versions of Windows. True or false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Internet explorer tab used to delete browsing history

A

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Internet tab that set zone settings

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Internet explorer tab that blocks cookies

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Internet explorer tab that sets up parental controls

A

Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Internet explorer tab that sets up proxy server settings

A

Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Internet explorer tab that manages add ones

A

Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Internet explorer tab that reset settings to default

A

Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Windows 10 features what new web browser which is designed to replace internet explorer

A

Microsoft edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

If a windows computer belongs to a _______ all security is managed by the network administrator for the entire network.

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An ________ is a small app or add on that can be downloaded from a web site long with a web page and is executed by IR to enchanted the web page. A ______ can sometimes hide in these but IE is designed to catch them by authenticating each it downloads

A

ActiveX Control

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

When a user logs onto a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The principle of _________ approach means a user account assigned to a computer user should have enough rights to perform his or her job no more.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A ________ cloud has devices established on an organizations own servers established virtually for a single organizations use.

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which NTFS permissions should you assign if the user should be able to create folders and files and open files to read data but not delete files.

A

Read, Write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

To use Remote Desktop the computer you access remotely can be running Windows 8 home or professional. True or false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Rights refer to the ______ an account is allowed to do in the system

A

Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

________ services have reporting policies in place to ensure transparency between customers and vendors

A

Measured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

__________ is the technology used in Windows to create a data source which provides access to a database and includes the drivers required to interact between applications and data

A

Open database connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

If both share and NTFS permissions are used the least restrictive permission between the two applies. True or false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Use _____ console in business and professional editions of Windows to create and manage your own user groups.

A

Computer Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

When attempting to access a remote computer on which your user name and password do not exist what user group will you be placed in?

A

Anonymous users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

If NTFS permissions conflict between a user and group the least restrictive permission applies. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

A

Guest group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following is true about user data folders with in a workgroup

A

Private data for each user should be kept in their C:\Users folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

The _______ tab in Windows IE can be used to control pop up blocker

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In a _______ cloud services are provided over the internet to the general public

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Rapid ________ refers to a services ability to be scaled up or down as need level changes for a customer

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is a valid reason for wanting to configure proxy server in IE?

A

To connect to secured websites on a corporate VPN

85
Q

Which of the following is not true about group policy?

A

All policies are applied before the logon screen appears

86
Q

Folders that are shared by default on a network domain that administrator accounts can access

A

Administrative shares

87
Q

Permissions assigned by windows that are attained from a parent object

A

Inherited permissions

88
Q

A group that can back up and restore any files on a Windows system regardless of access permissions to these files?

A

Backup Operators

89
Q

A method to control access to a folder or file and can apply to local users and network users

A

NTFS permissions

90
Q

A group that exists on Windows 8/7/Vista for backwards compatibility purposes with XO

A

Power Users

91
Q

A method to control access to a shared folder and can be assigned to NTFS or FAT volumes

A

Share permissions

92
Q

A console that is used to control what users can do and how the system can be used

A

Gpedit.msc

93
Q

Configuring a computer so that it will respond to network activity when the computer is in a sleep state

A

Wake on LAN

94
Q

When you copy a file the file takes on the permissions of the destination folder. True or false

A

True

95
Q

Permissions refer to which user ______ or user groups that are allowed access to data files and folders

A

Accounts

96
Q

What type of User accounts does Windows 7/8 support?

A

Administrator and Standard

97
Q

The default value of the security level in IE is medium high. True or false

A

True

98
Q

When all users on a network require the same access to all resources what type of network model should you use?

A

Homegroup

99
Q

What command launches the remote desktop client for Windows?

A

Mstsc

100
Q

In ___________ sharing all rights and permissions are set up on each local computer so that each computer manages access to its files, folders and printers shared on this peer to peer network.

A

Workgroup

101
Q

What protocol must be supported by routers in order to use easy connect

A

PNRP

102
Q

What keystroke should you press to get a logon window if you don’t use the welcome screen?

A

CTRL+ALT+Delete

103
Q

An employee or student is allowed to connect their own device to a corporate network.

A

Bring your own device

104
Q

Software installed on a computer that produces pop up ads using your browser

A

Adware

105
Q

A code used to identify and authenticate a person or organization sending data over a network

A

Digital certificate

106
Q

A program that is potentially harmful or potentially unwanted

A

Grayware

107
Q

An attack that can be used to crack a long password by trying words and word combinations

A

Dictionary attack

108
Q

Type of spyware that tracks your keystrokes including passwords

A

Keylogger

109
Q

The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer

A

Social engineering

110
Q

When someone who is unauthorized follows the employee through a secured entrance to a room or building

A

Tailgating

111
Q

A type of malware that tricks you into opening it by substituting itself for a legitimate program

A

Trojan

112
Q

A computer that has been hacked and the hacker is using the computer to run repetitive software in the background without the users knowledge

A

Zombie

113
Q

An infestation designed to copy itself repeatedly to memory on drive space or on a network.

A

Worm

114
Q

If you don’t want to use BitLocker to protect your computer you can still configure a powerful on password using which of the following?

A

The BIOS

115
Q

One way to authenticate users on a computer is to use a small device that contains authentication information. What is this device called?

A

Smart card

116
Q

__________ is a type of identity theft where the sender of an email scams you into responding with personal data

A

Phishing

117
Q

What command can be used to take full access of a file?

A

Icacls

118
Q

A ___________ attack tries every single combination of characters until it discovers your password

A

Brute force

119
Q

Turn off system protection when attempting to get rid of malware. True or false

A

True

120
Q

You can use _______ to configure several auditing policies that monitor and log security events

A

Gpedit.exe

121
Q

Command that refreshes local group policy as well as group policies set in active directory

A

Gpudate.exe

122
Q

What type of malware can hijack internal Windows components and often goes undetected because it is already loaded when the antivirus software loads?

A

Rootkit

123
Q

What does the presence of the icy app on an iOS device indicate?

A

The device has been jail broken

124
Q

Next generation firewall that can protect a private network

A

Unified threat management

125
Q

Using a pin of password in addition to TPM is an example of what type of authentication?

A

Multi factor

126
Q

If you want your computer to be protected by bitlocker encryption using. Imputes authentication what feature must your computer have?

A

TPM chip on the motherboard

127
Q

If you decide to use BitLocker be sure to make extra copies of the ______ key and or password and keep them in a safe location

A

Startup

128
Q

Determines what user, device, or program has access to a particular resource

A

Access control list

129
Q

A Trojan is often embedded in the files of legitimate software that is downloaded from an ______ website

A

Untrustworthy

130
Q

A large corporation might use a _______ firewall installed on a computer between internet and the network

A

Software

131
Q

After initially installing windows 7 you need to disable the guest account so nobody can use it. True or false

A

False

132
Q

Malware can sometimes display a false sign in screen to trick users into providing user account _____

A

Passwords

133
Q

A root certificate is the original certificate issued by the CA. True or false

A

True

134
Q

An encrypted file does not remain encrypted if you move it from an encrypted folder to an unencrypted folder on another NTFS volume. True or false

A

False

135
Q

When using the Windows Encrypted File System what statement is accurate?

A

An encrypted file moved to a. Unencrypted folder remains encrypted

136
Q

What technology can be used to locate a device such as a laptop after it has been stolen?

A

LoJack

137
Q

Anti malware software relies on what sort of update in order to define or detect malware as it gets into the wild

A

Malware signature

138
Q

A person that secretly peaks at your monitor while you work may be doing what?

A

Shoulder surfing

139
Q

On a P2P network authentication is the responsibility of the domain. True or false

A

False

140
Q

What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?

A

Degausser

141
Q

UEFI secure boot is especially designed to catch _____ that Maich during the boot.

A

Root kits

142
Q

A person using your computer after you step away from it is called what?

A

Tailgating

143
Q

Windows displays a _______ screen that can be dismissed by pressing a key on the keyboard or clicking anywhere in the screen which then takes the user to the sign in screen showing Val active user accounts.

A

Lock

144
Q

CryptoLocker is an example of what type of malware?

A

Ransomware

145
Q

What inputs are considered biometric devices

A
Finger print 
Retina 
Voice 
Handprint 
Face
146
Q

Windows firewall is a _________ firewall that protects a computer from intrusion

A

Personal

147
Q

In Linux the ____ command print displays when a user has root access.

A

#

148
Q

What methods exist to lock down a workstation running Windows such as when stepping away from the screen

A

CTRL ALT Delete and click lock this computer

Press Windows key + L

149
Q

Using group policy you can set security policies to help secure a workstation. True or false

A

True

150
Q

What statement regarding passwords on Windows is accurate?

A

By default accounts with a blank password can’t logon remotely

151
Q

Don’t use numbers for letters in passwords. True or false

A

True

152
Q

Windows Firewall is automatically configured when you set your network location in the network and sharing center. True or false

A

True

153
Q

Use the _____ command to view and delete root certificates

A

Certmgr.exe

154
Q

The ________ command can be used to change the way Windows Sign in works

A

Netplwiz.exe

155
Q

What is intended to protect intellectual property rights of organizations or individuals to creative works and software

A

Copyright

156
Q

In Linux a command prompt in the terminal is called a ______ prompt.

A

Shell

157
Q

What command let’s you view contents of a file?

A

Cat

158
Q

A decent ya let can serve as a thin client. True or false

A

True

159
Q

What is the advantage of a thick client

A

Can be used for purposes other than server side virtualization

160
Q

What two commands are used to change the permissions and ownership of a file or directory in Linux?

A

Chown

Chmod

161
Q

macOS is the latest version of the ______ operating systems

A

Proprietary

162
Q

Version of Linux are called distributions or _______

A

Flavors

163
Q

______ drives contain utility software that often use Linux

A

Flash

164
Q

What are Type 1 hypervisors called

A

Bare metal hypervisors

165
Q

If you need to redirect the output from a command what symbol should you use?

A

>

166
Q

After Windows is installed on a Mac computer ores and hold the _____ key to reach startup manager

A

Option

167
Q

A bootable Linux flash drive or cd that can be used to repair system issues is known by what term?

A

Live CD

168
Q

On Linux where are the commands required for system administration stored?

A

/sbin

169
Q

What operating system is based on open source code?

A

Android

170
Q

Swiping up with three fingers on macOS launches what?

A

Mission Control

171
Q

LILO is the most commonly installed boot loader by Linux. True or false?

A

False

172
Q

Basic versions of this OS are open source and all the underlying programming instructions called _____ code are freely distributed

A

Source

173
Q

Navigator macOS is made easier with a few simple _________ or finger movements on the trackpad

A

Gestures

174
Q

For a Windows VM be sure to configure windows _______ in the VM, keep windows updates current install and run antivirus software require ____________ for all user accounts in the VM and _____ data folders.

A

Firewall
Passwords
Encrypt

175
Q

A collection of data is copied to a backup media

A

Dump

176
Q

A personal computer that provides multiple virtual environments for applications

A

Client side virtualization

177
Q

functions similar to file explorer in windows used to find and access Macs files

A

Finder

178
Q

Manages virtual machines

A

Hypervisor

179
Q

An image of the entire partition on which an operating system is installed

A

Clone

180
Q

A remote application running on a server is controlled by a local computer

A

Presentation virtualization

181
Q

A text editor that works in command mode or insert mode

A

Vi editor

182
Q

Stands for Bourne again shell

A

Bash shell

183
Q

An operating system that has little computing power and only need to support a browser used to communicate with the server

A

Thin client

184
Q

The search app for Mac

A

Spotlight

185
Q

Boot camp can split a partition and install windows in the new partition for a ___ boot

A

Dual

186
Q

What Linux command below is used to test network connections by sending a request packet to a host?

A

Ping

187
Q

The main disadvantage to thin clients is the reduced cost of the client machine. True or false

A

False

188
Q

Mac OS built in password manager is

A

Keychain

189
Q

It is possible to store a DMG file on a server on the network using a MAC technology called what?

A

NetBoot

190
Q

Manages applications so the don’t install in Windows on the client computer

A

Application virtualization

191
Q

Type 2 hypervisors are typically used on desktops and _______ when performance and security are not issues.

A

Laptops

192
Q

Xenserver, VMware and Hyper V are examples of what type of hypervisors

A

Type 1

193
Q

First iteration of Mac OS X was called what?

A

Cheetah

194
Q

What might be required to set up a virtual machine?

A

Emulator

195
Q

The UEFI should support ______ virtualization when looking to install a hypervisor

A

Hardware assisted

196
Q

Linux utilizes what two different wildcard characters at the command line?

A

*

?

197
Q

Key press sequence to force quit window on a Mac

A

Command+option+esc

198
Q

What terms describe a machine that doesn’t have an operating system

A

Zero client
Dumb terminal
Ultra thin client

199
Q

On Linux the root users home directory is /home/root. True or false

A

False

200
Q

Type 2 hypervisor installs in a host operating system as an _______

A

Application

201
Q

What type of virtualization should you deploy to provide a virtual desktop infrastructure

A

Server side

202
Q

What Linux command can be used to copy and convert files, directories, partitions and evening entire dvds

A

DD

203
Q

A variation of the _____ operating system Linux was created by Linus Torvalds

A

Unix

204
Q

What is a typical use of a type 2 hypervisor

A

As a honeypot to lure hackers

By developers to test applications

205
Q

What occurs when Linux encounters an error that it can’t recover from?

A

Kernel panic

206
Q

What is the name of the macOS built in back up utility

A

Time machine

207
Q

What Linux distribution is considered cutting edge?

A

Fedora

208
Q

What user account is known as the system administrator or super user account?

A

Root