Deck 11: Network Operating System Fundamentals

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a function typically provided by the centralized management of a server-based network? (Choose all that apply.)

A) account management
B) user authentication and authorization
C) security policy management
D) application development
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What storage solution involves a third-party company that provides off-site hosting of data?

A) network-attached storage
B) cloud-based storage
C) network accessed appliance
D) storage area network
سؤال
Which of the following virtualization products uses a type 2 hypervisor?

A) Citrix XenServer
B) VMware vSphere
C) Microsoft Hyper-V
D) VMware Workstation
سؤال
What directory service protocol is used by Active Directory and also supported by Linux?

A) NFS
B) NIS
C) LDAP
D) ICMP
سؤال
Which of the following is NOT a typical function of a file system?

A) disk drive space organization
B) schedules processes and manages memory
C) hierarchical storage method
D) provides secure access to files
سؤال
Which protocol does Windows use by default for file sharing?

A) SMTP
B) SMB
C) FTP
D) SNMP
سؤال
How does a CPU perform multitasking?

A) using time division multiplexing
B) using asynchronous bus management
C) using time slicing and context switching
D) using process-driven frequency hopping
سؤال
What is a partial copy of a VM that is used to restore it to a previous state?

A) snapshot
B) clone
C) hypervisor
D) host computer
سؤال
When a disk is formatted, it is impossible to recover the data that was on the disk.
سؤال
You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create?

A) computer program
B) executable file
C) batch file
D) macro file
سؤال
For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks.
سؤال
Which of the following is a service NOT usually found on a client operating system?

A) DNS
B) file sharing
C) DHCP
D) directory service
سؤال
What is the native file-sharing protocol in Linux?

A) SMB
B) NFS
C) NSF
D) SMP
سؤال
Which feature of bare-metal virtualization products allows virtual resources to be allocated on demand to meet application requirements?

A) server consolidation
B) snapshots
C) live migration
D) dynamic provisioning
سؤال
What type of multitasking did older OSs use, which allowed a process to monopolize the CPU's time until the process had completed its own task?

A) contextual
B) cooperative
C) preemptive
D) multiplexed
سؤال
In order to multitask, a computer must have two or more processors.
سؤال
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware Workstation?

A) external
B) bridged
C) host-only
D) switched
سؤال
The kernel is a software layer that sits just above the computer hardware.
سؤال
A type 1 hypervisor runs directly on the host computer's hardware.
سؤال
What unit is used to divide the storage space on a disk drive?

A) bytes
B) sectors
C) bits
D) segments
سؤال
Which edition of Windows Server should you consider if you want to run many virtual instances of Windows Server with Hyper-V on the server?

A) Standard
B) Enterprise
C) Essentials
D) Datacenter
سؤال
RAID and server clustering are just two of the ____________ tolerant features found in many server operating systems.
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
the process of granting or denying access to resources by a user
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
identifying a user trying to access the network
سؤال
Which component of a file-sharing client intercepts requests for resources and determines if the resource is local or remote?

A) default gateway
B) resolver
C) UNC path
D) redirector
سؤال
When a user enters his username and password to log on to a machine, he is invoking the process of ____________.
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a program that is loaded into memory
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
two or more threads being executed simultaneously
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
runs in the background
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
partial copy of a virtual machine
سؤال
Which of the following file systems supports file and folder permissions? (Choose all that apply.)

A) EXT3
B) FAT16
C) FAT32
D) [NTFS
E) DOS
سؤال
With ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.
سؤال
A logon ___________ is a set of commands stored in a file that are executed when a users logs on to a Windows domain.
سؤال
In Windows, what are the two most common ways of accessing a shared folder? (Choose two.)

A) entering an ARP path
B) mapping a drive
C) entering a SMB path
D) entering a UNC path
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
smallest unit of software that can be scheduled
سؤال
On Windows, a ____________ is a program that runs in the background and provides support for other processes.
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
files stored on the host computer that represent a virtual machine's long-term storage
سؤال
Which technology is a fault tolerant feature provided by a server OS? (Choose all that apply.)

A) RAID
B) resolver cache
C) SMTP client
D) server clustering
E) hot-swappable devices
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a dedicated server device designed solely for providing shared storage for network users
سؤال
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a high-speed network storage solution for replacing locally attached drives on servers
سؤال
What is a hypervisor?
سؤال
What is a domain controller?
سؤال
Compare and contrast hosted virtualization versus bare-metal virtualization.
سؤال
How do you map a shared folder using the command prompt? Provide an example of mapping a drive letter H: to a share named myshare on a server named myserver.
سؤال
If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why?
سؤال
What is live migration with respect to OS virtualization?
سؤال
What is a storage area network and why might you use one?
سؤال
What is a server cluster and what is the difference between a failover cluster and a load-balancing cluster?
سؤال
What is the System Idle process, and what does its value mean?
سؤال
What are two types of isolation that virtualization can provide? Describe them.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Network Operating System Fundamentals
1
Which of the following is a function typically provided by the centralized management of a server-based network? (Choose all that apply.)

A) account management
B) user authentication and authorization
C) security policy management
D) application development
A, B, C
2
What storage solution involves a third-party company that provides off-site hosting of data?

A) network-attached storage
B) cloud-based storage
C) network accessed appliance
D) storage area network
B
3
Which of the following virtualization products uses a type 2 hypervisor?

A) Citrix XenServer
B) VMware vSphere
C) Microsoft Hyper-V
D) VMware Workstation
D
4
What directory service protocol is used by Active Directory and also supported by Linux?

A) NFS
B) NIS
C) LDAP
D) ICMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT a typical function of a file system?

A) disk drive space organization
B) schedules processes and manages memory
C) hierarchical storage method
D) provides secure access to files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which protocol does Windows use by default for file sharing?

A) SMTP
B) SMB
C) FTP
D) SNMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
How does a CPU perform multitasking?

A) using time division multiplexing
B) using asynchronous bus management
C) using time slicing and context switching
D) using process-driven frequency hopping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is a partial copy of a VM that is used to restore it to a previous state?

A) snapshot
B) clone
C) hypervisor
D) host computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
When a disk is formatted, it is impossible to recover the data that was on the disk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create?

A) computer program
B) executable file
C) batch file
D) macro file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a service NOT usually found on a client operating system?

A) DNS
B) file sharing
C) DHCP
D) directory service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the native file-sharing protocol in Linux?

A) SMB
B) NFS
C) NSF
D) SMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which feature of bare-metal virtualization products allows virtual resources to be allocated on demand to meet application requirements?

A) server consolidation
B) snapshots
C) live migration
D) dynamic provisioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What type of multitasking did older OSs use, which allowed a process to monopolize the CPU's time until the process had completed its own task?

A) contextual
B) cooperative
C) preemptive
D) multiplexed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
In order to multitask, a computer must have two or more processors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
You are testing out a new DHCP server and want to make sure that it does not interfere with your current network. What option would you use to configure your network adapter using VMware Workstation?

A) external
B) bridged
C) host-only
D) switched
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The kernel is a software layer that sits just above the computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A type 1 hypervisor runs directly on the host computer's hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What unit is used to divide the storage space on a disk drive?

A) bytes
B) sectors
C) bits
D) segments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which edition of Windows Server should you consider if you want to run many virtual instances of Windows Server with Hyper-V on the server?

A) Standard
B) Enterprise
C) Essentials
D) Datacenter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
RAID and server clustering are just two of the ____________ tolerant features found in many server operating systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
the process of granting or denying access to resources by a user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
identifying a user trying to access the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which component of a file-sharing client intercepts requests for resources and determines if the resource is local or remote?

A) default gateway
B) resolver
C) UNC path
D) redirector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
When a user enters his username and password to log on to a machine, he is invoking the process of ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a program that is loaded into memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
two or more threads being executed simultaneously
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
runs in the background
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
partial copy of a virtual machine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following file systems supports file and folder permissions? (Choose all that apply.)

A) EXT3
B) FAT16
C) FAT32
D) [NTFS
E) DOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
With ___________ multitasking, either the user or the OS can terminate a process that is monopolizing the CPU's time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A logon ___________ is a set of commands stored in a file that are executed when a users logs on to a Windows domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
In Windows, what are the two most common ways of accessing a shared folder? (Choose two.)

A) entering an ARP path
B) mapping a drive
C) entering a SMB path
D) entering a UNC path
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
smallest unit of software that can be scheduled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
On Windows, a ____________ is a program that runs in the background and provides support for other processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
files stored on the host computer that represent a virtual machine's long-term storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which technology is a fault tolerant feature provided by a server OS? (Choose all that apply.)

A) RAID
B) resolver cache
C) SMTP client
D) server clustering
E) hot-swappable devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a dedicated server device designed solely for providing shared storage for network users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match each item with a statement below.
a.authorization
b.authentication
c.multiprocessing
d.thread
e.process
f.service
g.NAS
h.SAN
i.snapshot
j.virtual disk
a high-speed network storage solution for replacing locally attached drives on servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is a hypervisor?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a domain controller?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Compare and contrast hosted virtualization versus bare-metal virtualization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How do you map a shared folder using the command prompt? Provide an example of mapping a drive letter H: to a share named myshare on a server named myserver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
If you store mainly large files on a disk, should you use a smaller cluster size or larger cluster size? Why?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is live migration with respect to OS virtualization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is a storage area network and why might you use one?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is a server cluster and what is the difference between a failover cluster and a load-balancing cluster?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is the System Idle process, and what does its value mean?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What are two types of isolation that virtualization can provide? Describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.