1.
What storage solution involves a third-party company that provides off-site hosting of data?
Correct Answer
C. Cloud-based storage
Explanation
Cloud-based storage involves a third-party company that provides off-site hosting of data. In this storage solution, data is stored on remote servers, which are accessed over the internet. This allows for easy scalability, flexibility, and accessibility of data from anywhere at any time. It also eliminates the need for organizations to maintain their own physical storage infrastructure, reducing costs and complexity.
2.
Which of the following virtualization products are used for bare-metal (Hypervisor type 1) virtualization?
Correct Answer(s)
A. Microsoft Hyper-V
C. Citrix XenServer
D. VMware vSpHere
Explanation
Microsoft Hyper-V, Citrix XenServer, and VMware vSphere are all examples of virtualization products that are used for bare-metal (Hypervisor type 1) virtualization. These products allow for the creation and management of virtual machines directly on the hardware without the need for an underlying operating system. This type of virtualization is commonly used in enterprise environments where high performance and scalability are required.
3.
What is the native file-sharing protocol in Linux?
Correct Answer
B. NFS
Explanation
NFS (Network File System) is the native file-sharing protocol in Linux. It allows a user on a client computer to access files over a network as if they were locally stored. NFS is commonly used in Linux environments to share files and directories between multiple computers. It provides a simple and efficient way to share files and is designed to be platform-independent, making it compatible with various operating systems.
4.
What are the chunks called into which the available storage space on a disk drive is broken?
Correct Answer
B. Sectors
Explanation
The available storage space on a disk drive is divided into smaller units called sectors. These sectors are the basic building blocks of data storage on a disk drive. Each sector typically holds a fixed amount of data, often 512 bytes, and is individually addressable. By breaking the storage space into sectors, the disk drive can efficiently organize and retrieve data.
5.
What directory service protocol used in Linux systems is also supported by Windows?
Correct Answer
B. LDAP
Explanation
LDAP (Lightweight Directory Access Protocol) is a directory service protocol used in Linux systems. It is also supported by Windows, allowing both Linux and Windows systems to communicate and share directory information. LDAP provides a standardized way to access and manage directory services, such as user authentication and authorization, making it a widely used protocol in both Linux and Windows environments.
6.
Which common e-mail protocol allows the user to access messages, yet still have them stored on the server?
Correct Answer
C. IMAP
Explanation
IMAP (Internet Message Access Protocol) is the correct answer because it allows users to access their email messages while keeping them stored on the server. Unlike POP3 (Post Office Protocol version 3), which typically downloads emails to the user's device and removes them from the server, IMAP allows users to view and manage their emails without actually downloading them. This makes it convenient for users who want to access their emails from multiple devices or locations, as the messages remain accessible on the server. SMTP (Simple Mail Transfer Protocol) is used for sending emails, while SNMP (Simple Network Management Protocol) is used for network management, not email retrieval.
7.
A user logs on to her account and is able to makes changes to her desktop, like adding a background and screen saver. However, when she logs off and logs back on, the desktop reverts to its original configuration. What type of user profile does this user have?
Correct Answer
C. Mandatory
Explanation
The user has a mandatory user profile. A mandatory user profile is a type of profile that does not allow any changes to be saved by the user. Any modifications made to the desktop or settings will not be saved and will revert back to the original configuration once the user logs off and logs back on.
8.
What is RAID level 1 also called?
Correct Answer
A. Disk mirroring
Explanation
RAID level 1 is also known as disk mirroring because it involves creating an exact copy or mirror of data on two separate disks. This provides redundancy and fault tolerance, as if one disk fails, the data can still be accessed from the other disk. Disk mirroring ensures data integrity and increases system reliability by providing an immediate backup of data.
9.
What is the process called that grants or denies a user’s access to network resources?
Correct Answer
B. Authorization
Explanation
Authorization is the process that grants or denies a user's access to network resources. It involves determining the privileges and permissions that a user has, based on their identity and role within the network. This process ensures that only authorized individuals are able to access specific resources, protecting the network from unauthorized access and potential security breaches.
10.
This is the software that allows a Linux server to talk with a Microsoft server.
Correct Answer
C. Samba
Explanation
Samba is the correct answer because it is a software suite that allows Linux servers to communicate with Microsoft servers. It provides file and print services using the SMB/CIFS protocol, allowing Linux servers to share files and resources with Windows-based systems. Samba enables interoperability between different operating systems, making it possible for Linux and Windows servers to communicate and share data seamlessly.
11.
In Linux, to give a file (file.txt) permissions that grant the owner read, write, and execute, the group read and write, and all others just execute, which command would be executed?
Correct Answer
C. Chmod 761 file.txt
Explanation
The command "chmod 761 file.txt" would be executed to give the specified permissions to the file.
12.
When an IP address in the DHCP scope is associated with a specific MAC address, it is considered:
Correct Answer
D. Reserved
Explanation
When an IP address in the DHCP scope is associated with a specific MAC address, it is considered "Reserved". This means that the DHCP server will always assign the same IP address to the device with that MAC address. This is useful for devices that require a consistent IP address, such as servers or network printers. The reserved IP address will not be assigned to any other device in the network, ensuring that the device with the specific MAC address always receives the same IP address.
13.
Which protocol does Microsoft use to share files with servers and printers?
Correct Answer
D. SMB
Explanation
Microsoft uses the SMB (Server Message Block) protocol to share files with servers and printers. SMB is a network file sharing protocol that allows users to access files, printers, and other resources on a network. It is commonly used by Microsoft Windows operating systems to facilitate file sharing and communication between computers.
14.
Which RAID version is the most efficient using 3 or more drives?
Correct Answer
B. 5
Explanation
RAID 5 is the most efficient version when using 3 or more drives. In RAID 5, data is distributed across multiple drives along with parity information, which allows for data redundancy and fault tolerance. This means that if one drive fails, the data can still be reconstructed using the parity information on the remaining drives. RAID 5 also offers good performance as it allows for simultaneous read and write operations across multiple drives, making it an efficient choice for data storage and retrieval.
15.
System administrators that use Active Directory typically manage indivduals, not groups.
Correct Answer
B. False
Explanation
This statement is incorrect. System administrators that use Active Directory typically manage both individuals and groups. Active Directory allows administrators to create and manage user accounts for individuals as well as create and manage groups for easier management and organization of users. By placing users into groups, administrators can assign group-based permissions and policies, making it more efficient to manage access and resources within the network.
16.
When dealing with permissions in Linux, what are the three user types that can be assigned permissions? (Choose three.)
Correct Answer(s)
B. Owner
C. Group
F. Other
Explanation
In Linux, permissions can be assigned to three user types: Owner, Group, and Other. The Owner refers to the user who owns the file or directory and has the highest level of control over it. The Group refers to a group of users who have similar permissions on the file or directory. The Other refers to all other users who are not the owner or part of the group. These three user types allow for granular control over who can access and modify files and directories in Linux.
17.
Which of the following are the correct permissions for the command chmod 574?
Correct Answer
E. R-xrwxr--
Explanation
The correct answer is "r-xrwxr--". The command "chmod 574" sets the permissions for a file or directory. The first digit "5" represents the owner's permissions, which are "r-x" (read and execute). The second digit "7" represents the group's permissions, which are "rwx" (read, write, and execute). The third digit "4" represents the others' permissions, which are "r--" (read only). Therefore, the correct permissions for the command "chmod 574" are "r-xrwxr--".
18.
Before changes to a system can be accurately measured, this must be created:
Correct Answer
C. Baseline
Explanation
A baseline must be created before changes to a system can be accurately measured. A baseline serves as a reference point or starting point against which the effects of changes can be compared. It helps to establish a clear understanding of the system's performance and behavior before any modifications are made. By comparing the system's performance after changes to the baseline, the impact of those changes can be accurately measured and evaluated.
19.
What level of RAID does not provide fault tolerance?
Correct Answer
C. 0
Explanation
RAID 0 does not provide fault tolerance. In RAID 0, data is striped across multiple drives without any redundancy or parity information. This means that if one drive fails, all the data stored on that drive will be lost. RAID 0 is primarily used for performance improvement, as it allows for faster read and write speeds by distributing data across multiple drives. However, it does not provide any protection against drive failures, making it the only RAID level that does not offer fault tolerance.
20.
Which of the following is NOT a Linux file system?
Correct Answer
A. SFS
Explanation
SFS is not a Linux file system. The other options, Ext3, ReiserFS, and Ext4, are all valid Linux file systems.
21.
How many disks are needed to implement a RAID 1 + 0?
Correct Answer
B. 4
Explanation
RAID 1+0, also known as RAID 10, combines mirroring (RAID 1) and striping (RAID 0) techniques. In RAID 1+0, data is mirrored across multiple pairs of disks and then striped across those mirrored pairs. This provides both redundancy and improved performance. To implement RAID 1+0, a minimum of four disks are required. The data is mirrored across two sets of disks, and then those mirrored sets are striped together. Therefore, the correct answer is 4.
22.
What is RAID level 1 also called?
Correct Answer
C. Disk mirroring
Explanation
RAID level 1 is also known as disk mirroring because it involves creating an exact copy or mirror of the data on one disk onto another disk. This provides redundancy and fault tolerance as if one disk fails, the system can still continue to operate using the mirrored disk. Disk mirroring ensures data integrity and high availability, making it a reliable option for data protection.
23.
The partition that contains the Windows OS files is known as the what type of partition?
Correct Answer
B. Boot
Explanation
The partition that contains the Windows OS files is known as the "boot" partition. This partition holds the necessary files for the computer to start up and load the operating system. It contains the Windows Boot Manager and other essential boot files. Without a boot partition, the computer would not be able to initiate the boot process and start the operating system.
24.
FAT32 was replaced by this file system:
Correct Answer
A. NTFS
Explanation
FAT32, a file system commonly used in older Windows operating systems, was replaced by NTFS (New Technology File System). NTFS was introduced with Windows NT and offers several advantages over FAT32, including improved security, support for larger file sizes and partitions, and better data recovery options. NTFS also provides features like file compression, encryption, and access control, making it a more advanced and efficient file system compared to FAT32.
25.
The software that Linux uses to talk to a Microsoft server using SMB is called?
Correct Answer
B. Samba
Explanation
Samba is the correct answer because it is the software that Linux uses to communicate with a Microsoft server using the Server Message Block (SMB) protocol. Samba allows Linux to share files and printers with Windows systems and enables Linux to access shared resources on a Windows network. NFS (Network File System) is a different protocol used for sharing files between Unix-like systems, while CIFS (Common Internet File System) is the Windows implementation of SMB. NIS (Network Information Service) is a network directory service used in Unix-like systems for centralized user and group management.
26.
A device that provides "consistent and clean" power, but doesn't provide battery backup is called a:
Correct Answer
B. Voltage Regulator
Explanation
A device that provides "consistent and clean" power refers to a voltage regulator. A voltage regulator is designed to stabilize and maintain a constant voltage level for electronic devices by regulating the voltage fluctuations from the power source. It ensures that the voltage supplied to the devices remains within a specific range, protecting them from voltage surges or drops that could potentially damage the equipment. However, a voltage regulator does not provide battery backup, meaning it does not have the capability to provide power during a power outage or blackout.