Deck 2: System Administration

Full screen (f)
exit full mode
Question
A cold spare is a

A) Single point of failure
B) Redundant component that can replace a failed component with no downtime
C) Spare components used to replace failed components as quickly as possible
D) Popular component purchased when it is on sale
Use Space or
up arrow
down arrow
to flip the card.
Question
Defining the rights of organizational members to information in the organization is called

A) Access control
B) User management
C) Installation
D) Configuration
Question
Selecting one among many possible combinations of features of a system is called

A) User management
B) Access control
C) Installation
D) Configuration
Question
A part of a system whose failure will stop the entire system from working is a

A) Single point of failure
B) Redundancy
C) Availability
D) Nagios
Question
Listening and/or recording the activities of a system to maintain performance and security is called

A) Access control
B) User management
C) Monitoring
D) Configuration
Question
Writing the necessary data in the appropriate locations on a computer 's hard drive for running a software program is called

A) Configuration
B) Access control
C) Installation
D) User management
Question
Cloud computing models include all of the following except

A) Revenue as a service
B) Infrastructure as a service
C) Platform as a service
D) Software as a service
Question
Common functions offered by system utilities in the Windows world include

A) Providing surplus capacity, to improve availability
B) Replacing failed components with minimal downtime
C) Automating the collection of music and other multimedia information
D) Automating and auditing the installation and maintenance of software
Question
The types of monitoring include

A) Penetration testing and access control
B) Health checking and log monitoring
C) Nagios and log monitoring
D) Reactive monitoring and pro-active testing
Question
The system administrator is the person responsible for

A) Day-to-day operation of a technology system
B) Writing , enforcing , and reviewing security-operating procedures
C) Developing new technology systems
D) Upgrading existing technology systems
Question
Common system administration tasks include

A) Developing software
B) Purchasing hardware
C) Updating software
D) Customer service
Question
UNIX was developed by

A) Ken Thompson and Dennis Ritchie in 1969
B) Bill Gates and Paul Allen in 1977
C) Edgar F. Codd in 1970
D) Bob Metcalfe in 1973
Question
A virtual machine

A) Is another name for computers installed insider virtual reality gaming systems
B) is a software container into which an operating system and applications can be installed
C) Is the display device in virtual reality systems
D) Is a machine in name only
Question
Limiting access to information system resources only to authorized users, programs, processes, or other systems is called

A) Access control
B) User management
C) Installation
D) Configuration
Question
Active Directory

A) Encourages computer users to perform physical activities throughout the day
B) Adds icons to directories in Windows Explorer
C) Improves search features in Windows computers
D) Provides centralized user management and access control for computers
Question
The domain controller in Active Directory

A) Serves web pages in the domain
B) Bills users in the domain
C) Implements the active directory rules in the domain
D) Installs updated on all computers in the domain
Question
System administration provides all of the following except

A) Support services
B) Reliable operations
C) Efficient use of the system
D) Project management
Question
Redundancy is

A) Availability of choices
B) Surplus capacity, used to improve the reliability of a system
C) Availability of multiple versions of a software
D) Managing users in a domain
Question
A hot spare is a

A) Single point of failure
B) Redundant component that can replace a failed component with no downtime
C) Spare components used to replace failed components as quickly as possible
D) Popular component purchased when it is on sale
Question
The system security officer is the person responsible for

A) Day-to-day operation of a technology system
B) Writing , enforcing , and reviewing security-operating procedures
C) Developing new technology systems
D) Upgrading existing technology systems
Question
Linux is

A) An operating system that behaves like UNIX, though it has an independent code base
B) A different brand of UNIX
C) A version of Windows
D) A database system
Question
Open source software is

A) An operating system that behaves like UNIX
B) Software in which anyone can modify the source code
C) A version of Windows
D) A hobby
Question
A Linux distribution is

A) A collection of open source utilities and software packaged with the Linux OS
B) An older version of Linux
C) A specific version of Linux, focused on competing with Microsoft
D) The "official" version of Linux
Question
Multiple versions of Unix exist because

A) Availability of choices is good for customers
B) Unix and Linux are not maintained
C) Availability of versions improved the competitiveness of Unix against Windows
D) AT&T licensed many institutions to create their own versions
Question
Common functions of Linux System Administration utilities include

A) Automated customer service
B) Automated business processing
C) Automated installation
D) Automated marketing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: System Administration
1
A cold spare is a

A) Single point of failure
B) Redundant component that can replace a failed component with no downtime
C) Spare components used to replace failed components as quickly as possible
D) Popular component purchased when it is on sale
C
2
Defining the rights of organizational members to information in the organization is called

A) Access control
B) User management
C) Installation
D) Configuration
B
3
Selecting one among many possible combinations of features of a system is called

A) User management
B) Access control
C) Installation
D) Configuration
D
4
A part of a system whose failure will stop the entire system from working is a

A) Single point of failure
B) Redundancy
C) Availability
D) Nagios
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Listening and/or recording the activities of a system to maintain performance and security is called

A) Access control
B) User management
C) Monitoring
D) Configuration
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Writing the necessary data in the appropriate locations on a computer 's hard drive for running a software program is called

A) Configuration
B) Access control
C) Installation
D) User management
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Cloud computing models include all of the following except

A) Revenue as a service
B) Infrastructure as a service
C) Platform as a service
D) Software as a service
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Common functions offered by system utilities in the Windows world include

A) Providing surplus capacity, to improve availability
B) Replacing failed components with minimal downtime
C) Automating the collection of music and other multimedia information
D) Automating and auditing the installation and maintenance of software
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The types of monitoring include

A) Penetration testing and access control
B) Health checking and log monitoring
C) Nagios and log monitoring
D) Reactive monitoring and pro-active testing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The system administrator is the person responsible for

A) Day-to-day operation of a technology system
B) Writing , enforcing , and reviewing security-operating procedures
C) Developing new technology systems
D) Upgrading existing technology systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Common system administration tasks include

A) Developing software
B) Purchasing hardware
C) Updating software
D) Customer service
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
UNIX was developed by

A) Ken Thompson and Dennis Ritchie in 1969
B) Bill Gates and Paul Allen in 1977
C) Edgar F. Codd in 1970
D) Bob Metcalfe in 1973
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
A virtual machine

A) Is another name for computers installed insider virtual reality gaming systems
B) is a software container into which an operating system and applications can be installed
C) Is the display device in virtual reality systems
D) Is a machine in name only
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Limiting access to information system resources only to authorized users, programs, processes, or other systems is called

A) Access control
B) User management
C) Installation
D) Configuration
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Active Directory

A) Encourages computer users to perform physical activities throughout the day
B) Adds icons to directories in Windows Explorer
C) Improves search features in Windows computers
D) Provides centralized user management and access control for computers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The domain controller in Active Directory

A) Serves web pages in the domain
B) Bills users in the domain
C) Implements the active directory rules in the domain
D) Installs updated on all computers in the domain
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
System administration provides all of the following except

A) Support services
B) Reliable operations
C) Efficient use of the system
D) Project management
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Redundancy is

A) Availability of choices
B) Surplus capacity, used to improve the reliability of a system
C) Availability of multiple versions of a software
D) Managing users in a domain
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
A hot spare is a

A) Single point of failure
B) Redundant component that can replace a failed component with no downtime
C) Spare components used to replace failed components as quickly as possible
D) Popular component purchased when it is on sale
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The system security officer is the person responsible for

A) Day-to-day operation of a technology system
B) Writing , enforcing , and reviewing security-operating procedures
C) Developing new technology systems
D) Upgrading existing technology systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Linux is

A) An operating system that behaves like UNIX, though it has an independent code base
B) A different brand of UNIX
C) A version of Windows
D) A database system
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Open source software is

A) An operating system that behaves like UNIX
B) Software in which anyone can modify the source code
C) A version of Windows
D) A hobby
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
A Linux distribution is

A) A collection of open source utilities and software packaged with the Linux OS
B) An older version of Linux
C) A specific version of Linux, focused on competing with Microsoft
D) The "official" version of Linux
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Multiple versions of Unix exist because

A) Availability of choices is good for customers
B) Unix and Linux are not maintained
C) Availability of versions improved the competitiveness of Unix against Windows
D) AT&T licensed many institutions to create their own versions
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Common functions of Linux System Administration utilities include

A) Automated customer service
B) Automated business processing
C) Automated installation
D) Automated marketing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.