Deck 14: System Administration

Full screen (f)
exit full mode
Question
Fire detection is a special problem in computer facilities.
Use Space or
up arrow
down arrow
to flip the card.
Question
IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.
Question
Most computer equipment is designed to operate reliably over a range of voltage levels.
Question
Signatures are the basis for determining users' authorization to access resources the OS manages.
Question
Monitors can operate continuously or intermittently.
Question
Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.
Question
Standardization tends to encourage innovation and produce solutions that are optimal for most users.
Question
​Computer performance is measured in terms of application tasks that can be performed in a given time frame.
Question
The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
Question
Infrastructure management tends to concentrate on providing short-term services at minimal cost.
Question
An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.
Question
Electrical fires often generate heat and smoke as quickly as conventional fires do.
Question
Operating systems now cooperate with one another to perform authentication and authorization.
Question
Surge protection is normally an add-on to a UPS.
Question
Typical operating expenditures include buildings, land, equipment, and research and development costs.
Question
The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.
Question
Computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.
Question
Application firewalls improve security by shielding internal servers and resources from direct access by outside users.
Question
Accurate data is the most important requirement for good configuration decisions.
Question
​Some UPSs, particularly those with long delivery times, are designed to work with a computer's OS.
Question
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.

A) capital expenditures
B) operating expenditures
C) infrastructure expenditures
D) infrastructure expenditures
Question
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

A) Access
B) Accounting
C) Authorization
D) Authentication
Question
____ is the process of determining or verifying the identity of a user or process owner.

A) Authentication
B) Authorization
C) Accounting
D) Access
Question
A ____ is a measure of computer system performance while executing one or more processing tasks.

A) benchmark
B) requirement
C) standard
D) watermark
Question
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

A) performance requirements
B) storage requirements
C) user requirements
D) hosting requirements
Question
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

A) operating system
B) application software
C) transaction monitor
D) database system
Question
A ____ describes the resource or service utilization of an application program during execution.

A) transaction monitor
B) program profiler
C) software monitor
D) limit monitor
Question
In all cases, strategic plans must address the basic question "____?"

A) How did we get here
B) Where should we go
C) How do we get there from here
D) What brought us here
Question
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.

A) program profiler
B) transaction monitor
C) software monitor
D) limit monitor
Question
​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.

A) software administration​
B) system administration
C) ​system development
D) ​software development
Question
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

A) resource contention model
B) resource overage model
C) application demand model
D) application utilization model
Question
A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.

A) invitation to negotiate
B) request for quotation
C) request for bid
D) request for proposal
Question
System administrators can use the ____ utility to monitor hardware and software resource use in real time.

A) Task Manager
B) Performance List
C) Task List
D) Performance Monitor
Question
____ are programs or hardware devices that detect and report processing or I/O activity.

A) Monitors
B) Metrics
C) Benchmarks
D) Transactions
Question
The resources devoted to most organizational activities can be classified into two categories: ____.

A) capital expenditures and operating expenditures
B) capital investments and operating expenditures
C) capital controls and operating controls
D) capital resources and capital gains
Question
In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.

A) Access
B) auditing
C) monitoring
D) certifying
Question
In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.

A) log
B) packet
C) packet
D) virus
Question
____ are assets or resources expected to provide benefits beyond the current fiscal year.

A) Operating resources
B) System resources
C) Manage resources
D) Capital resources
Question
The ____ composes the majority of an RFP.

A) requirements statement
B) performance statement
C) design statement
D) specifications statement
Question
The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.

A) strategic value
B) tactical value
C) competitive advantage
D) comparable advantage
Question
The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.

A) packet-filtering
B) stateful
C) application
D) inspecting
Question
The term ____________________ refers to execution speed.
Question
Capital resources are referred to as ____________________.
Question
____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.

A) Power sags
B) Power spikes
C) Power loops
D) Power blocks
Question
A(n) ____ is a device that provides power to attached devices in the event of external power failure.

A) generator
B) uninterruptible power supply
C) power filter
D) rectifier
Question
A(n) ____ tracks the progress of complex client/server interactions.

A) application firewall
B) stateful firewall
C) packet-filtering firewall
D) proxy
Question
A(n) longer-term power sag that is often caused by the power provider is known as a ____.

A) blackout
B) grayout
C) brownout
D) green down
Question
Information systems are a combination of hardware, system software, and ____________________ software.
Question
Antivirus software uses data files, sometimes called "____," containing information about known viruses.

A) behaviors
B) heuristics
C) signature files
D) packets
Question
An RFP is generally considered a(n) ____________________ offer.
Question
Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.
Question
____________________ expenditures provide benefits only in the current fiscal year.
Question
In general, the humidity level of a room containing computer equipment should be near ____%.

A) 15
B) 25
C) 40
D) 50
Question
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

A) Viruses
B) Signatures
C) Logs
D) Infectors
Question
The ____________________ model describes a computer's capability to deliver resources to application software.
Question
A(n) ____ is a server that handles service requests from external users of applications.

A) packet-filtering firewall
B) proxy
C) stateful firewall
D) application firewall
Question
A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.

A) Trojan
B) worm
C) macro
D) signature
Question
A vendor's response to an RFP is a(n) ____________________ of the offer.
Question
Requirements in an RFP should be categorized by ____________________ and listed completely.
Question
A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.
Question
​List the three broad categories in which a typical information system (IS) administrator's tasks may be grouped.
Question
Hardware must also be protected against ____________________ resulting from excessive humidity.
Question
In computer security, a(n) ____________________ is a hardware device, software, or a combination of hardware and software that prevents unauthorized users in one network from accessing resources on another network.
Question
Until recently, applying patches and upgrades was a(n) ____________________ process.
Question
Protection against power loss requires a(n) ____________________ power source.
Question
List three common capabilities of antivirus software.
Question
Why is a raised floor often used in a room with multiple computer hardware cabinets?
Question
____________________ authentication methods are sometimes used instead of password-based authentication.
Question
A(n) ____________________ detects incoming power surges and diverts them to ground in nanoseconds.
Question
A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.
Question
Excessive heat can cause intermittent or total failure of electrical circuits, so all computer equipment needs some means of heat ____________________.
Question
Discuss why disaster planning is important and what measures are normally taken.
Question
​What, at a minimum, should goals for a strategic plan include?
Question
A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.
Question
Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: System Administration
1
Fire detection is a special problem in computer facilities.
True
2
IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.
True
3
Most computer equipment is designed to operate reliably over a range of voltage levels.
True
4
Signatures are the basis for determining users' authorization to access resources the OS manages.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
Monitors can operate continuously or intermittently.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Standardization tends to encourage innovation and produce solutions that are optimal for most users.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
​Computer performance is measured in terms of application tasks that can be performed in a given time frame.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
Infrastructure management tends to concentrate on providing short-term services at minimal cost.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Electrical fires often generate heat and smoke as quickly as conventional fires do.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Operating systems now cooperate with one another to perform authentication and authorization.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Surge protection is normally an add-on to a UPS.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Typical operating expenditures include buildings, land, equipment, and research and development costs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Application firewalls improve security by shielding internal servers and resources from direct access by outside users.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Accurate data is the most important requirement for good configuration decisions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
​Some UPSs, particularly those with long delivery times, are designed to work with a computer's OS.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.

A) capital expenditures
B) operating expenditures
C) infrastructure expenditures
D) infrastructure expenditures
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
____ is the process of determining whether an authenticated user or process has enough rights to access a resource.

A) Access
B) Accounting
C) Authorization
D) Authentication
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
____ is the process of determining or verifying the identity of a user or process owner.

A) Authentication
B) Authorization
C) Accounting
D) Access
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
A ____ is a measure of computer system performance while executing one or more processing tasks.

A) benchmark
B) requirement
C) standard
D) watermark
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.

A) performance requirements
B) storage requirements
C) user requirements
D) hosting requirements
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.

A) operating system
B) application software
C) transaction monitor
D) database system
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
A ____ describes the resource or service utilization of an application program during execution.

A) transaction monitor
B) program profiler
C) software monitor
D) limit monitor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
In all cases, strategic plans must address the basic question "____?"

A) How did we get here
B) Where should we go
C) How do we get there from here
D) What brought us here
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.

A) program profiler
B) transaction monitor
C) software monitor
D) limit monitor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.

A) software administration​
B) system administration
C) ​system development
D) ​software development
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.

A) resource contention model
B) resource overage model
C) application demand model
D) application utilization model
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.

A) invitation to negotiate
B) request for quotation
C) request for bid
D) request for proposal
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
System administrators can use the ____ utility to monitor hardware and software resource use in real time.

A) Task Manager
B) Performance List
C) Task List
D) Performance Monitor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
____ are programs or hardware devices that detect and report processing or I/O activity.

A) Monitors
B) Metrics
C) Benchmarks
D) Transactions
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
The resources devoted to most organizational activities can be classified into two categories: ____.

A) capital expenditures and operating expenditures
B) capital investments and operating expenditures
C) capital controls and operating controls
D) capital resources and capital gains
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.

A) Access
B) auditing
C) monitoring
D) certifying
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.

A) log
B) packet
C) packet
D) virus
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
____ are assets or resources expected to provide benefits beyond the current fiscal year.

A) Operating resources
B) System resources
C) Manage resources
D) Capital resources
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ composes the majority of an RFP.

A) requirements statement
B) performance statement
C) design statement
D) specifications statement
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.

A) strategic value
B) tactical value
C) competitive advantage
D) comparable advantage
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.

A) packet-filtering
B) stateful
C) application
D) inspecting
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
The term ____________________ refers to execution speed.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
Capital resources are referred to as ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.

A) Power sags
B) Power spikes
C) Power loops
D) Power blocks
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) ____ is a device that provides power to attached devices in the event of external power failure.

A) generator
B) uninterruptible power supply
C) power filter
D) rectifier
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
A(n) ____ tracks the progress of complex client/server interactions.

A) application firewall
B) stateful firewall
C) packet-filtering firewall
D) proxy
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) longer-term power sag that is often caused by the power provider is known as a ____.

A) blackout
B) grayout
C) brownout
D) green down
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Information systems are a combination of hardware, system software, and ____________________ software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Antivirus software uses data files, sometimes called "____," containing information about known viruses.

A) behaviors
B) heuristics
C) signature files
D) packets
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
An RFP is generally considered a(n) ____________________ offer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
____________________ expenditures provide benefits only in the current fiscal year.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
In general, the humidity level of a room containing computer equipment should be near ____%.

A) 15
B) 25
C) 40
D) 50
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.

A) Viruses
B) Signatures
C) Logs
D) Infectors
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
The ____________________ model describes a computer's capability to deliver resources to application software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
A(n) ____ is a server that handles service requests from external users of applications.

A) packet-filtering firewall
B) proxy
C) stateful firewall
D) application firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.

A) Trojan
B) worm
C) macro
D) signature
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
A vendor's response to an RFP is a(n) ____________________ of the offer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
Requirements in an RFP should be categorized by ____________________ and listed completely.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
​List the three broad categories in which a typical information system (IS) administrator's tasks may be grouped.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
Hardware must also be protected against ____________________ resulting from excessive humidity.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
In computer security, a(n) ____________________ is a hardware device, software, or a combination of hardware and software that prevents unauthorized users in one network from accessing resources on another network.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Until recently, applying patches and upgrades was a(n) ____________________ process.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Protection against power loss requires a(n) ____________________ power source.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
List three common capabilities of antivirus software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
Why is a raised floor often used in a room with multiple computer hardware cabinets?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ authentication methods are sometimes used instead of password-based authentication.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) ____________________ detects incoming power surges and diverts them to ground in nanoseconds.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Excessive heat can cause intermittent or total failure of electrical circuits, so all computer equipment needs some means of heat ____________________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Discuss why disaster planning is important and what measures are normally taken.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
​What, at a minimum, should goals for a strategic plan include?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.