Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . - - - - - - - - - - - - - - - - - - - - - - -

1.------------------------ is software created to insert itself on a machine to subvert the security of the system
- Windows
- Linux
- Comsys
- Malware
2. Which of these IPs is a loopback address?
-127.0.0.1
-127.100.0.1
-172.100.0.1
-172.0.0.1
3. As a systems administrator how can you achieve buy in bulk, allocate fractions?
- Grid
- Cloud
- Virtualization
- None of the above
4. What does the acronym VLAN stands for?
- Vertical local area network
- None of the above
- Ventura local area network
- Virtual local area network
5. A ___________ refers to a user interface that allows users to interact with an operating system or execute commands
- Kernel
- Switch
- Shell
- None of the above
6.46.__________________ regular users who are granted the ability to execute specific commands with superuser privileges.
- sudo users
- anonymous users
- system users
- remote users
7. In IPv4 Addresses, classful addressing is replaced with
- classless Addressing
- classless Advertising
- classful Addressing
- classful Advertising
8. In ____________ communication, the data is addressed specifically to a particular destination device.
- Multicast
- Broadcast
- None of the above
- Unicast
9. Which of the following is used for web communication and secure web browsing?
- HTTP/HTTPS
- DNS (Domain Name System)
- SMTP/POP3/IMAP
- TCP/IP protocols
10. In a dynamic configuration, the machine asks the network what its configuration parameters should be. More diligently, it talks to a service on the network, which responds with those parameters. What is this service called in Internet Protocol versions 4 and 6(IPv4 and IPv6)?
- DHTCL
- DNS
- HTTPS
- DHCP
11. As long as software is being actively supported by the vendor, there will always be updates, often called ___________
- None of the above
- Debugging
- Patches
- Primer
12. The 4-byte IP address consists of_______________
- media address and host address
- both network address and host address
- host address
- network address
13. The ______________ is the core component of an operating system that acts as a bridge between software and hardware.
- Cornel
- Defender
- Kernel
- defragment
Implementing ___________ ensures that individuals have only the level of access necessary for their specific job roles and responsibilities, reducing the risk of excessive privileges
RBCC
RBCA
RBAA
RBAC
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
Disintermediation
Expandability
Scalability
Modality
The command chmod 654 myfile grants _________ the permission to read and write but cannot execute myfile
Owner
Group
Others
Everyone
The OSI model has ______________________layers
4
5
6
7
Which of these is a standard field in the /etc/passwd
All of the above
Home directory
Username
Login shell
A network that spans a city, and sometimes its major suburbs, as well, is called a
CAN
LAN
MAN
WAN
Which of these directories contains system-wide configuration files and scripts in Ubuntu?
/usr
/bin
None of the above
/etc
---------------------- represents a file with read, write, and execute permissions for the owner, read and execute permissions for the group, and read-only permissions for others.
"rw_r-xr--"
"r-xr-xrwx"
"r__r-xrwx"
"rwxr-xr--"
The network address of 172.16.0.0/19 provides how many subnets and hosts?
7 subnets, 2,046 hosts each
7 subnets, 30 hosts each
8 subnets, 2,046 hosts each
8 subnets, 8,190 hosts each
Which of the following is not a fundamental way to configure a storage?
Diskless
Foreign
Local
Stateless
Which of the following is not a characteristic of fungibility?
The files that need to be accessed should be stored on a workstation
The files that need to be accessed should be stored on network file servers
It should be possible for anyone with an account to log into any workstation
The applications the customers need should be immediately available
Which protocol can be used to monitor devices on a network?
DLNP
BNP
SNMP
None of the above
What service converts IP addresses into more recognizable alphanumeric names?
IP
FTP
HTML
DNS
A SAN is a ________ network.
Server area
Service-oriented architecture
Storage area
Scalable architecture
Which of these is not a duty of a system administrator?
None of the above
Install software
Create file systems
Monitor system performance
Certainly! Here are the questions along with the answer options:
1. What is the command to remove read and write permissions for the group and others from a file?
-`chmod go-rw filename`
-`chmod gu+rw`
-`chmod gu-rw`
-`chmod go-r

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data Concepts, Theories, And Applications

Authors: Shui Yu, Song Guo

1st Edition

3319277634, 9783319277639

More Books

Students also viewed these Databases questions