Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . - - - - - - - - - - - - - - - - - - - - - - -

1.------------------------ is software created to insert itself on a machine to subvert the security of the system
- Windows
- Linux
- Comsys
- Malware
2. Which of these IPs is a loopback address?
-127.0.0.1
-127.100.0.1
-172.100.0.1
-172.0.0.1
3. As a systems administrator how can you achieve buy in bulk, allocate fractions?
- Grid
- Cloud
- Virtualization
- None of the above
4. What does the acronym VLAN stands for?
- Vertical local area network
- None of the above
- Ventura local area network
- Virtual local area network
5. A ___________ refers to a user interface that allows users to interact with an operating system or execute commands
- Kernel
- Switch
- Shell
- None of the above
6.46.__________________ regular users who are granted the ability to execute specific commands with superuser privileges.
- sudo users
- anonymous users
- system users
- remote users
7. In IPv4 Addresses, classful addressing is replaced with
- classless Addressing
- classless Advertising
- classful Addressing
- classful Advertising
8. In ____________ communication, the data is addressed specifically to a particular destination device.
- Multicast
- Broadcast
- None of the above
- Unicast
9. Which of the following is used for web communication and secure web browsing?
- HTTP/HTTPS
- DNS (Domain Name System)
- SMTP/POP3/IMAP
- TCP/IP protocols
10. In a dynamic configuration, the machine asks the network what its configuration parameters should be. More diligently, it talks to a service on the network, which responds with those parameters. What is this service called in Internet Protocol versions 4 and 6(IPv4 and IPv6)?
- DHTCL
- DNS
- HTTPS
- DHCP
11. As long as software is being actively supported by the vendor, there will always be updates, often called ___________
- None of the above
- Debugging
- Patches
- Primer
12. The 4-byte IP address consists of_______________
- media address and host address
- both network address and host address
- host address
- network address
13. The ______________ is the core component of an operating system that acts as a bridge between software and hardware.
- Cornel
- Defender
- Kernel
- defragment
14. Implementing ___________ ensures that individuals have only the level of access necessary for their specific job roles and responsibilities, reducing the risk of excessive privileges
RBCC
RBCA
RBAA
RBAC
15. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
Disintermediation
Expandability
Scalability
Modality
16. The command chmod 654 myfile grants _________ the permission to read and write but cannot execute myfile
Owner
Group
Others
Everyone
17. The OSI model has ______________________layers
4
5
6
7
18. Which of these is a standard field in the /etc/passwd
All of the above
Home directory
Username
Login shell
19. A network that spans a city, and sometimes its major suburbs, as well, is called a
CAN
LAN
MAN
WAN
20. Which of these directories contains system-wide configuration files and scripts in Ubuntu?
/usr
/bin
None of the above
/etc
21.---------------------- represents a file with read, write, and execute permissions for the owner, read and execute permissions for the group, and read-only permissions for others.
"rw_r-xr--"
"r-xr-xrwx"
"r__r-xrwx"
"rwxr-xr--"
22. The network address of 172.16.0.0/19 provides how many subnets and hosts?
7 subnets, 2,046 hosts each
7 subnets, 30 hosts each
8 subnets, 2,046 hosts each
8 subnets, 8,190 hosts each
23. Which of the following is not a fundamental way to configure a storage?
Diskless
Foreign
Local
Stateless
24. Which of the following is not a characteristic of fungibility?
The files that need to be accessed should be stored on a workstation
The files that need to be accessed should be stored on network file servers
It should be possible for anyone with an account to log into any workstation
The applications the customers need should be immediately available
Which protocol can be used to monitor devices on a network?
DLNP
BNP
SNMP
None of the above
25. What service converts IP addresses into more recognizable alphanumeric names?
IP
FTP
HTML
DNS
26. A SAN is a ________ network.
Server area
Service-oriented architecture
Storage area
Scalable architecture
27. Which of these is not a duty of a system administrator?
None of the above
Install software
Create file systems
Monitor system performance

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning Microsoft SQL Server 2012 Programming

Authors: Paul Atkinson, Robert Vieira

1st Edition

1118102282, 9781118102282

More Books

Students also viewed these Databases questions

Question

What is the relationship between negative thinking and depression?

Answered: 1 week ago