1. Which of the following are considered part of the physical infrastructure service? Check all that apply.
Answers
·
Laptop
·
Rack server
·
Desktop
·
Operating systems
2. Which of the
following are considered a network service? Check all that apply.
Answers
·
DNS
·
Email server
·
Blade server
·
Wireless Internet
3. Amazon Web Services,
Linode, Windows Azure, and Google Compute Engine are examples of ________.
Answers
·
NaaS providers
·
Shopping places
·
Computer brands
·
IaaS Providers
Explanation: Examples of cloud computing platforms or cloud service providers include Amazon Web Services, Linode, Google Compute Engine, and Microsoft Azure (previously Windows Azure). They provide Infrastructure as a Service (IaaS) and other cloud services, which enable customers to get access to and make use of computer resources, storage, and services via the internet without the need for real hardware or the administration of physical infrastructure.
4. Which of the
following are considered a software service? Check all that apply.
Answers
·
Wireless Internet
·
Word processors
·
Email applications
·
Chat applications
5. What type of service
is an all-in-one solution to building and deploying a web application?
Answers
·
PaaS
·
NaaS
·
SaaS
·
IaaS
Explanation: Platform as a Service (PaaS) is a term that is often used
to refer to a solution that includes both the construction and deployment of a
web application. PaaS gives users access to a platform that simplifies the
process of application creation, deployment, and administration by providing
the necessary software, services, and infrastructure. Without having to worry
about the underlying infrastructure, developers are free to concentrate on
creating code and adding features while using a platform as a service (PaaS).
Heroku, Google App Engine, and Microsoft Azure App Service are a few examples of providers that fall within the PaaS category. It is often simpler for developers to construct and deploy online applications when using these platforms since they provide a variety of services, such as web hosting, database administration, scalability capabilities, and development tools.
6. Which one of the
following operating systems would be best suited for running a server?
Answers
·
Ubuntu Server
·
MacOS
·
Windows 10
·
Ubuntu
Explanation: There
are many different operating systems that are capable of running servers, and
the selection of one should be based on a number of considerations, including
the particular use cases, personal preferences, and level of technical skill.
Linux distributions, in particular those belonging to the Debian/Ubuntu and
CentOS/RHEL families, are often used in server settings. You may be thinking
about making use of one or more of these possibilities.
7. Which of the
following are benefits of virtualizing servers? Check all that apply.
Answers
·
Easier maintenance.
·
Low RAM memory requirement.
·
Better performance than a dedicated
server.
· Better hardware resource utilization.
8. Which of the
following are ways that can be used to run services?
Answers
·
Virtualized instance on a
server.
·
Dedicated hardware
·
VPN
· SSH
9. Which of the
following is needed in order to use SSH to connect to a machine? Check all that
apply.
Answers
·
A VPN connection.
·
An SSH server on the
machine you want to connect to.
·
A virtual server to connect to.
· An SSH client on the machine from which the connection begins.
10. Which of the
following are samples of remote access tools? Select all that apply.
Answers
·
RAM
·
RDP
·
OpenSSH
·
WinRM
11. What is one benefit
of using TFTP over SFTP?
Answers
·
Added security
·
Simpler transfer without
authentication
·
The encrypted transfer of data
·
The user authentication requirement
Explanation: However, it is essential to keep in mind that although TFTP has certain benefits in terms of its ease of use, it does not have the security protections that are offered by SFTP. Since TFTP does not include any encryption, authentication, or other security procedures, using it for the transmission of safe and sensitive data is not the best idea. SFTP, on the other hand, offers an alternative that is more secure because to its capabilities in the areas of encryption and authentication. Which protocol, TFTP or SFTP, should be used to transfer files depends on the particular needs of the use case as well as any relevant security concerns.
12. What service can you
use to keep time synchronized across the machines on your fleet?
Answers
·
FTP
·
Kerberos
·
NTP
·
SFTP
Explanation: You
may use the Network Time Protocol (NTP) service to maintain the time on all of
the computers in a fleet synced with one another. NTP is a protocol that was
developed to synchronize the time on all of the computers that are connected to
a network. It makes it possible for machines to keep precise and consistent
time, which is essential for a wide variety of applications and services that
depend on synchronized time.
13. What features does a
proxy offer? Check all that apply.
Answers
·
Network privacy
·
Network traffic monitoring
·
Internet traffic filtering
·
The ability for employees to share
information more easily
14. The ability for
employees to share information more easily
Answers
·
DHCP
·
DNS
·
NTP
·
SFTP
15. If you don't want to
use static IP addresses, but want to dynamically assign IP addresses to
computers instead, what network protocol can you use?
Answers
·
TFTP
·
Kerberos
·
NTP
·
DHCP
Explanation: You may utilize the Dynamic Host Configuration Protocol
(DHCP) if you wish to dynamically assign IP addresses to computers rather than
using static IP addresses. This can be done by avoiding using static IP
addresses. A network protocol known as DHCP is responsible for the automated
assignment of IP addresses and other information on the setup of a network to
devices that are connected to that protocol.
This kind of dynamic IP address assignment makes it
possible to have a more flexible and automated administration of IP addresses
inside a network, which in turn reduces the need for any human setup. In order
to streamline the procedure of joining devices to a network, DHCP is a protocol
that is often used in private as well as public network.
16. Which of these is an advantage
of using Infrastructure as a Service (or IaaS) solutions?
Answers
·
It
lets users access software online without having to install it on individual
systems.
·
It provides the resources users need without
maintaining any actual hardware.
·
The
user can keep files on a local network.
·
It
centralizes the organization’s users and computers in one location, and the
organization can add, update, or remove users and computers.
Answers
·
SaaS
(Software as a Service)
·
PaaS (Platform as a Service)
·
DaaS
(Directory as a Service)
·
IaaS
(Infrastructure as a Service)
Answers
·
User
experience
·
Maintenance
·
Security
·
Performance
Because of
this increased resource usage, there are cost savings, a decreased physical
footprint, and greater scalability. This is because virtual machines can be
provided and de-provisioned dynamically depending on the needs of the workload.
Additionally, it helps to improve energy efficiency by reducing the number of
physical servers required to do the same amount of computing work as before.
Answers
·
A Proxy server
·
DNS
·
FTP
·
An
Intranet
Answers
·
A
proxy
·
An
intranet
·
NTP
·
A:
FTP
Answers
·
NTP
·
TFTP
·
SFTP
·
FTP
Answers
·
PuTTY
·
OpenSSH
·
WinRM
·
RDP
Answers
·
ISP
DNS servers
·
Your local machine
·
Top-level
domains
·
Root
servers
24. Which of the following is an
advantage of using DHCP?
Answers
·
DHCP leases IP addresses, removing the need to
manually assign addresses.
·
DHCP
allows usage of static IP addresses
·
DHCP
allows you to manually set IP addresses.
·
DHCP
maps IP addresses to human readable URLs.
Answers
·
External
ISP DNS servers
·
The local host file
·
Local
DNS servers
·
External
public DNS servers
Shuffle Q/A 1
26. Google’s GSuite (now called Google Workspace) is an example
of which Cloud service?
Answers
·
Software as a Service (SaaS)
·
Directory
as a Service (DaaS)
·
Infrastructure
as a Service (IaaS)
·
Platform
as a Service (PaaS)
As a
Software as a Service (SaaS) offering, customers access and use these apps
using a web browser, and Google hosts and maintains the software on their cloud
infrastructure. customers access and use these applications. Because everything
is handled and distributed from the cloud under this approach, there is no
longer a need for users to install, administer, and update the software on
their local computers.
Answers
·
A
simplified user interface
·
The need to depend on a provider for service
·
Having
to purchase expensive networking hardware
·
Recurring
cost
28. Which of the following is a
potential negative (con) of virtualization compared to using dedicated
hardware?
Answers
·
Maintenance
·
Cost
·
Points
of failure
·
Performance
29. A sysadmin wants to use preboot
execution over a network. Which type of server will the sysadmin likely use to
administer operating system installation files?
Answers
·
A
DNS server
·
An
FTP server
·
An
SFTP server
·
A TFTP server
PXE is a
network booting protocol that enables a computer to boot and load its operating
system from a network server rather than from local storage. This eliminates
the need for the machine to be connected to the same network as the server. In
the context of PXE booting, a TFTP server is used to transport the required
data to the client computer during the preboot phase. These files include the
initial boot loader as well as installation files for the operating system.
The client
computer starts the process by broadcasting a PXE boot request, and the
PXE-enabled network interface card (NIC) on the client then gets answers from
DHCP (Dynamic Host Configuration Protocol) and TFTP servers. This is the
standard procedure. The client receives information on the setup of the network
from the DHCP server. This information includes the IP address of the TFTP
server as well as the location of the boot file.
After
that, the TFTP server will provide the necessary boot files to the client so
that it may begin the boot process. This makes it possible for system
administrators to easily deploy or reinstall operating systems on many
workstations across the network.
To
summarize, a sysadmin will utilize a TFTP server to oversee the transfer of
operating system installation files to client computers during the preboot
execution phase of PXE booting. This will take place when the preboot execution
phase is taking place.
30. PuTTY in Windows is similar to
which Linux tool?
Answers
·
CLI
·
SSH
·
RDP
·
Virtualization
On the
other hand, OpenSSH is a collection of open-source technologies that may be
used for safe remote logins, the transmission of files, and tunneling. It is
the implementation of the SSH protocol that is considered to be the standard,
and Linux and other operating systems that are similar to Unix utilize it
extensively. OpenSSH comes with command-line tools such as ssh, which is used
to connect to remote servers; scp, which is used to securely copy files; and
sftp, which is used to securely transfer files.
Both PuTTY
and OpenSSH are meant to provide secure remote access to servers; however,
their implementations are distinct and they are optimized for use with a
variety of operating systems. PuTTY and OpenSSH fulfill the same essential
goal. While OpenSSH is a program that comes standard on Linux operating
systems, PuTTY is designed to work only with Windows.
Answers
·
It maps names humans can understand to IP
addresses.
·
It maps local addresses to simple names
without editing hosts files.
·
It
lets users remotely operate computers from miles away.
·
It
improves network throughput.
Answers
·
DHCP
sets up an authoritative DNS server a network.
·
DHCP assigns IP addresses to computers on a
network.
·
DHCP
maps domain names to IP addresses.
·
DHCP
keeps the clock synchronized on machines connected to a network.
Answers
·
Physical
infrastructure services
·
Platform
services
·
Network
services
·
Directory services
Microsoft's
Active Directory is a directory service that is often used to manage people,
computers, and other resources in a network that is based on Windows. Active
Directory was created by Microsoft.
Answers
·
Allow more network connections
·
Added security
·
More RAM capacity
·
A
simplified user interface
Answers
·
A
DNS server
·
IaaS
·
An
FTP Client
·
A
server operating system
Answers
·
An
authoritative DNS server
·
A
TFTP server
·
A
VNC client
·
A
proxy server
Answers
·
Ping
localhost
·
Use
nslookup in the terminal to rule out DNS issues
·
Turn
the device off and on again
·
Access
host file and check for inconsistencies
38. Which service gives access to pre-configured virtual
machines that can be used like physical servers?
Answers
·
DaaS
·
IaaS
·
SaaS
·
PaaS
Answers
·
It
provides access to software maintained on the Cloud.
·
It
provides remote access to other computers in another part of the world.
·
It
puts many instances on a single physical server.
·
It
keeps all the machines on a network synchronized.
Explanation: When you virtualize a server, you generate virtual instances of the operating system and programs that are installed on the server. This makes it possible for numerous virtual servers to coexist on a single physical server. Server virtualization is the term used to describe this procedure.
40. Which of the
following best describes an intranet?
Answers
·
An intranet is a type of file transfer
protocol.
·
An intranet is used to
host a company’s internal websites and resources.
·
An intranet is a service that provides
access to pre-configured virtual machines for a fee.
·
An intranet is a single server with
many virtual instances on it.
Explanation: A
private network that exists inside an organization and makes use of internet
technology to enable its members to communicate more easily with one another,
exchange information privately, and work together on projects is known as an
intranet. It is a network with limited access that runs on the internal
infrastructure of the business and is not available to the general public.
41. A network technician
is unable to resolve a domain name. What is the first step the technician
should take to troubleshoot the problem?
Answers
·
Verify that the DNS server is giving a
correct address
·
Check that the network
connection is working
·
Reconfigure the local host file
·
Restart the browser