Guide to Operating Systems 4th edition Palmer Walters Chapter 10 and 11

Created by jsturd 

Upgrade to
remove ads

128 terms

Windows computers can make a shared drive look like a local drive by mapping. T/F

True

In Linux, a network drive that is attached to the file system is called a mapped drive. T/F

False

It is preferable to assign permissions to individual users rather than groups because the amount of work for the administrator is reduced. T/F

False

Global groups are used to hold user accounts while domain local groups are used to hold Global groups and provide access to resources. T/F

True

NFS is used by UNIX/Linux systems to mount a shared partition as a drive letter. T/F

False

You are explaining to a colleague how to make a shared resource available on a Linux file system. Which of the following terms best describes what you should tell him?
a. map a drive letter
b. mount a drive letter
c. mount a volume
d. map a volume

c. mount a volume

Which of the following password security options enables the server to 'remember' a user's previous passwords?
a. Minimum password length
b. Enforce password history
c. Passwords must meet complexity requirements
d. Minimum password age

b. Enforce password history

Which account feature can be configured to prevent a user from logging in after incorrectly entering the password a number of times?
a. Account disable
b. Account expiration
c. Account lockout
d. Account reset

c. Account lockout

Which of the following is NOT included in the Linux password (/etc/passwd) file?
a. user name
b. user permissions
c. UID
d. home directory location

b. user permissions

To protect user's passwords on a Linux system, they can be kept in a file only available to the system administrator. What is the name of that file?
a. etc/passwd
b. /sys/secpass
c. /etc/shadow
d. /sys/encryptpass

c. /etc/shadow

You need to create a user on your Red Hat Enterprise Linux system. What command should you use?
a. newuser
b. userconf
c. useradd
d. moduser

c. useradd

You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?
a. you didn't add the user to the right group
b. the user is not entering the password correctly
c. the user has caps lock on
d. the account is disabled

d. the account is disabled

Which of the following is a valid permission in the Linux file system?
a. Full Control
b. Modify
c. Write
d. Change

c. Write

Which of the following is NOT an event type that can be set up for logging using Server Admin on Mac OS X Server?
a. Login and Logout events
b. Installation of applications
c. Opened files
d. Deleted files

b. Installation of applications

Which of the following permissions should you set on a shared printer in Windows to allow a junior administrator to configure the properties of the printer?
a. Full Control
b. Manage Printers
c. Manage Documents
d. Modify

b. Manage Printers

__________ is a software process that enables a client workstation to attach to a shared folder on another workstation and assign it a drive letter.

Mapping

A _________________ service provides a central listing of resources and the ability to access and manage resources.

directory

You use __________ groups to hold user accounts from the same domain as members.

global

The account lockout ____________ enables you to set a limit to the number of unsuccessful attempts to log onto an account.

threshold

In Windows, the ___________ sharing permission enables users to read, add, modify, execute, and delete files but not change permissions.

Change

Automatic Private IP Addressing (APIPA)

Luis, suspecting that he had a connection problem, used the IPCONFIG command and discovered that his IPv4 address started with "169" in the first octet, an address in the range of addresses used for ____________________.

anonymous FTP

A/an ____________________ site allows users to access it without requiring that they supply a user name and password.

DHCP

A/an ____________________ client receives its IP address over the network from a special server.

TRACERT

Working from home, Bryan determined that the connection to the school Web site was too slow, so he ran the ____________________command to see if he could find where the bottleneck might be.

default gateway

Roland was able to connect to servers on the LAN, but discovered that an incorrect ____________________address was preventing him from communicating beyond his local network.

Domain Name System (DNS)

"mcgraw-hill.com" is a name in the ____________________.

PING

A quick way to test the communications between your desktop computer and another computer is to use the ____________________ command.

static

In a TCP/IP network, a server will most likely have a ____________________IP address.

TCP/IP (IPv4)

____________________ has been the protocol for logical addressing on the Internet for over 30 years.

fully qualified domain name (FQDN)

An example of a ___________________ is www.mcgraw-hill.com.

A client OS coordinates network activities, authenticates users to access the network and enables workstations to access shared network resources. T/F

False

LANs often connect WANs over a long distance such as between cities, states, or countries. T/F

False

A large file is broken into hundreds of small data units called packets and each data unit is transmitted across the network. T/F

True

The transmission control method used by Ethernet is called collision sense multiple access with carrier detection (CSMA/CD). T/F

False

TCP establishes communication sessions among applications on two communicating computers. T/F

True

You have been hired to design a small office network that will have 10 workstations and two servers. You want to use a network topology that is flexible for future growth and performance enhancements. Which topology should you choose?
a. ring
b. star
c. bus
d. mesh

b. star

A colleague has asked you where the media access control address of his computer is located? What do you tell him?
a. NIC
b. switch
c. BIOS
d. hub

a. NIC

You need to connect two groups of about 20 computer each that are located on different floors of a building. Which media type will work best for this scenario?
a. coax
b. UTP
c. fiber-optic
d. HFC

c. fiber-optic

You are called in to a business that just expanded its network onto another floor of the building. There are 30 stations on each floor. You have been told that the two groups of computers must be able to communicate but for security reasons, there must be a way to filter communication between the two networks. What device do you recommend?
a. hub
b. router
c. wireless access point
d. bridge

b. router

Which of the following is true of Ethernet?
a. uses CSMA/CA
b. usually implemented in a ring topology
c. defined by the 802.11 standard
d. Fast Ethernet is 100 Mbps

d. Fast Ethernet is 100 Mbps

You are setting up a wireless network. The environment in which this network will run has several other devices such as cordless phones that run in the 2.4 GHz frequency range. You want to avoid conflicts with other devices. Which wireless standard should you consider?
a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11i

a. 802.11a

Which of the following is NOT a likely consideration when purchasing a NIC?
a. the cable interface matches the cabling used on the network
b. there is a driver available for the OS
c. the MAC address of the NIC
d. the NIC bus interface matches an available expansion slot

c. the MAC address of the NIC

Which of the following is a task typically performed by TCP?
a. packet addressing
b. closes communication session
c. handles packet routing
d. fragments packets as needed

b. closes communication session

You are diagnosing a network communication problem on a computer that uses the TCP/IP protocol. What address can you use to test network services without actually accessing the network?
a. 10.0.0.1
b. 1.0.0.0
c. 127.0.0.1
d. 0.0.0.0

c. 127.0.0.1

You have a server on your network that your users frequently access. You don't want the server's address to change. What type of addressing method should you use?
a. APIPA
b. static
c. DHCP
d. unicast

b. static

A _____________ OS enables a workstation to run applications and access shared resources, but is usually not involved in authentication or sharing resources.

client

_________ runs on Windows Server 2008 and is used to install client OSs on a mass scale.

Windows Deployment Services, WDS

A _____________ is the physical design of the network, or the path data takes when it goes from one computer to another.

topology

The __________ is the software logic on a NIC that consists of one or more programs residing in a programmable chip on the card.

firmware

The _________ address is used for diagnostics and uses the IPv6 address of 0:0:0:0:0:0:0:1.

loopback

Your Windows 7 workstation's hard drive seems to be laboring to find files, possibly because you added and deleted hundreds of files without performing any special disk maintenance. To improve the hard drive's performance you should_________.

use the Disk Defragmenter to defragment the

To start Software Update in Mac OS X Snow Leopard, click __________________.

the Apple icon

When you are considering a vendor's application software, which of the following should you look into?

Compatibility with the operating system you are using.
Documentation
CPU, RAM, and disk storage requirements
List of bugs

Which of the following RAID levels involve(s) disk mirroring?

level 1
level 10

Temporary Internet files often have which of the following extensions?

.gif
.html
.htm

As you are examining the contents of the Windows directory in Windows 7, which of the following are subdirectories you would expect to find?

system32
system

This morning you modified five large data files in your home directory in Linux and now you want to find and delete those files becuase you not longer need them. Which of the following commands can you use to list and sort files on the basis of the time they were modified?

ls -t

You use the Internet frequently. What simple step should you perform on a regular basis to maintain your computer?

Use your Internet browser or an operating system utility to regularly delete temporary Internet files.

When you attempt to access a specific application in Mac OS X Snow Leopard you see a message that the disk is corrupted. Which of the following tools enables you to examine the disk, find the disk problem, and hopefully fix it?

Disk First Aid in the Disk Utility

From where can you open Windows Update so that you can configure this tool to automatically obtain updates?

Control Panel

In most directory structures, the directory that contains the operating system is ______________.

in the root.

In Windows, operating systems, a(n) ______type of backup backs up all files that have the archive attribute and this type of backup removes the archive attributes from each file after backing it up.

incremental

In Linux, you are preparing to delete the user account tprice, because this user has just left the company. However, before you delete the account, you want to list all files owned by tprice so that you can locate them and decide which files to keep. What command enables you to view all files owned by the tprice account?

find / -user tprice

In Windows Vista/7 you can monitor the page file performance from which of the following?

Task Manager Performance tab

Which of the following utilities in Windows 7 can be used to find and delete temporary files created by programs?

Disk Cleanup

Your Linux workstation runs slowly when you use certain applications. You decide to determine the amount of the swap file system that is in use when you run these applications. Which of the following commands enables you to determine swap file system use?

vmstat

Your colleague has made an image backup of the files on a Windows Server 2008 R2 server and now wants to restore only two user home directories from the backup. Which of the following tools enable him to restore only those directories?

No tool can be used because you cannot restore only certain directories from an image backup.

How can you purge a file in Mac OS X Snow Leopard?

Send the file to the Trash and then delete it from the Trash.

Your organization's Windows Server 2008 server has been running a little slow and you decide to check the virtual memory configuration. The server has 8 GB of memory. What should the initial size of the paging file be set at in terms of MB?

12,288 MB

After you start your Windows 7 computer in the morning, you attempt to access your organization's network to open an inventory program, but you don't seem to be able to make a network connection. Which of the following commands enables you to test your computer's ability to connect to the network?

ping

Which of the following are reasons why networks exist?

File sharing
Fax sharing
Printer sharing

Which of the following would you find in the /etc/passwd file in Red Hat Enterprise Linux?

UID
User name

Which tool(s) can you use to set up shared printing so that a Mac OS X system can offer a shared printer on a network?

Sharing in System Preferences
Print & Fax in System Preferences

What tool in Mac OS X enables the user to access and use a printer shared by a computer running Windows 7 on a network?

Print & Fax

Which of the following enables a computer running Red Hat Enterprise Linux to access a Windows Server that has shared folders?

Samba

You have discovered that intruders are attempting to remotely access accounts on your organization's Windows Server 2008 server over the Internet. Which of the following should yo configure to increase security?

Account lockout

You are in charge of a group of server administrators who manage servers for an organization that uses Active Directory and has multiple domains and trees. What type of Windows Server 2008 security groups might you set up to simplify security access for the server administrators across all domains and trees?

A universal group that contains access to resources in all domains and a global group of all server administrators' user accounts.

Kerberos is an example of a(n) ______________ on a Windows Server 2008 server.

account policy

What happens when you execute chmod 0755 calc.c, where calc.c is a calculator program on a Red Hat Enterprise Linux server?

The owner of the program file can execute it and change it.

Your small organization has just set up a network connecting Windows 7 and Mac OS X workstations. You recommend setting up a Windows Server 2008 server from which to share files. However, the manager of customer services complains in a meeting that his Mac OS X workstation won't be able to access Windows-based files. What is your response?

Mac OS X users can access the shared server files through the Connect to Server tool in Mac OS X.

Printer sharing on a computer running Windows 7 can be configured as ______________.

a printer property

In Mac OS X, you connect to a shared resource on another computer by using _____________.

Samba

You are working with NTFS permissions on a Windows Server 2008 folder but discover you cannot change some permissions because they are already checked in shaded and deactivated boxes. What is the problem?

These permissions are inheritable permissions, so you must turn off this function before you can change them.

You have set up a folder for Web sharing on a Windows Server 2008 with IIS installed. However, for security reasons you want to prevent users from running scripts. What folder permissions enable you to control the ability to run scripts?

Web sharing permissions

You can share resources between the following systems using the Network File System (NFS).

Red Hat Enterprise Linux and Fedora

The company president's administrative assistant has complained to you that the business manager sometimes ties up the shared printer in the president's office area, even though the business manager has been asked not to use this printer. What can you do to configure the printer so the business manager does not have access? (Choose all that apply.)

Set up the printer so that all permissions to it are denied for the business manager's account.

In Mac OS X Server, you manage the server with _____________?

Server Admin

You have found an old administrator's account on a computer running Red Hat Enterprise Linux and determine that you should delete it because it is a security risk. What command can you use to delete the account?

userdel

In Windows Server 2008/Server 2008 R2, global groups typically contain which of the following?

user accounts

You have asked a new Windows Server 2008 administrator to create four new user accounts, but when he opens the Computer Management tool, the Local Users and Groups tool is disabled. Why is this and what can he do?

This means that Active Directory is installed, and he must use the Active Directory Users and Computer tools.

Which of the following is a partial backup that backs up files with the archive attribute and then removes the archive attribute on those files?

incremental

Which of the following RAID configurations uses disk striping and includes the ability to replace a failed drive and rebuild the RAID without shutting down the server?

RAID 5

You find that disk operations on your server have gradually gotten slower. You look at the hard disk light and it seems to be almost constantly active and the disk seems noisier than when you first installed the system. What is the likely problem?

the disk is fragmented

Which command should you use on a Linux system to find and print a list of files that begin with acctg that have been modified in the last 10 days?

find -name acctg* -mtime -10 -print

Which of the following values is the recommended maximum percentage of disk space you should use for best reliability?

80

Which of the following is the correct syntax for specifying a shared folder on a server in Windows?

\\server\share

You have just successfully created a user named acoulter on your Red Hat Enterprise Linux system. You left the password blank so the user can easily log on and create her own password. The user calls you and informs you she cannot logon. She has tried several times and has used a blank password but still cannot logon. What is likely to be the problem?

the account is disabled

Which permission to a folder should you give a user if that user should be able to create files but not read or execute files in that folder?

Write

You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. What type of group should you create to add the users to and assign permissions to the resource?

Universal

The organization of the file system on a server has no impact on network performance or security.

False

Deleting temporary files on a Windows system is not necessary because Windows doesn't create temporary files.

False

Disk fragmentation causes reduced disk performance because the disk read/write heads must move longer distances.

True

A differential backup backs up files that have the archive attribute set but does not reset the archive attribute.

True

Virtual memory is a storage area in a computer's RAM that is set aside for the page file.

False

You find that disk operations on your server have gradually gotten slower. You look at the hard disk light and it seems to be almost constantly active and the disk seems noisier than when you first installed the system. What is the likely problem?

the disk is fragmented

After you start your Windows 7 computer in the morning, you attempt to access your organization's network to open an inventory program, but you don't seem to be able to make a network connection. Which of the following commands enables you to test your computer's ability to connect to the network?

ping

You have shared a folder on a Windows server that is a part of a domain. You need to assign permissions to users so they can access the shared folder. Which type of group will you use to make the permissions assignment?

Domain local

Which of the following is NOT a function of a directory service?

decentralizes user management

You manage a multi-domain network, DomainA, DomainB, and DomainC. You have users from each domain that must have permission to a shared folder in DomainB. Which of the following represents the correct method of assigning these users permissions?

Create a Universal group. Add the users from the domains to the Universal group and add the Universal group to the share permissions list.

A user is complaining that he cannot open a file in a shared folder. He is able to open other files in the same shared folder. Which of the following could be the problem?

he has Read sharing permission but has a Deny permission on the file

Which of the following is true about permissions on an NTFS volume?

a file that is moved to another volume inherits the parent folder's permissions

You need to assign the read and execute permission to a folder named /docs/acctg to other. Which of the following commands does this?

chmod o +rx /docs/acctg

You need to specify which clients are allowed to access files on a UNIX/Linux system using NFS. What should you do?

edit the /etc/hosts.allow file

Which of the following is NOT a good rule to follow when creating a file structure?

create a folder for deleted files to be stored temporarily

You have used Windows Performance monitor and you are trying to locate the files created by this application. What is the name of the folder where Windows store the results of Windows performance tests?

PerfLogs

Which of the following is a database of information about the Windows operating system including customized settings and software installations?

registry

Which of the following is a file extension that indicates the file type of application in a Windows environment?

exe

Which of the following commands should you use to delete files on a Linux system?

rm

You manage a server that users store their document files on. You are finding that some users are utilizing more space than they should with some very large files. What can you do to prevent users from taking up too much space on the server?

set up disk quotas

If you analyze your disk and find that most of the files are stored contiguously on the disk, what should you do?

nothing

Which of the following is a method to defragment a hard disk?

backup the disk and do a full restore

If your Mac OS system displays a message indicating it is low on memory, which of the following is NOT a remedy to this memory fragmentation problem?

plug in a USB flash drive

Which command should you run on a Windows system to check for and fix problems with the file system?

chkdsk

Which of the following is NOT an argument for using RAID?

decreased costs

Which software RAID levels do Windows server OSs provide?

RAID 0, 1, 5

Which of the following is a true statement about rotating backup media?

it can protect against media failure

Which of the following is a general rule you should consider when configuring a page/swap file?

the initial size should be set to 1.5 times the amount of RAM

Which of the following is NOT true about using the ping utility?

it cannot work through routers

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

NEW! Voice Recording

Click the mic to start.

Create Set