• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back
Dynamic DNS and DHCP are ideal solutions to implement at any data center or computer configuration.

A. True
B. False
b. False
The hardware platform should be matched to the service it supports.

A. True
B. False
A. True
A workstation is suitable for use as a server if the demands on the workstation are limited, such as a test lab.

A. True
B. False
A. True
The need for automated processes and adequate supporting documentation is useful only in mature or very large organizations or organizations that frequently perform the process.

A. True
B. False
B. False
Physical Security of a data center is not as important as the network security of the servers.

A. True
B. False
B. False
What are some tools that every SA (System Administrator) should have?

A. Screwdriver set
B. Portable hard Drive
C. A spare PC
D. Hammer
E. Answers a. b. and c.
E. Answers a. b. and c.
What is the best way to deal with frequent machine crashes?

A. Replace each machine that fails with a new system.
B. Patch the symptoms as they arise.
C. Find the root cause.
D. Blame the problem on someone else's Department.
E. Answers b. and c.
E. Answers b. and c.
In a routine check of the network files, you find music files of a musician that the rest of your team would really enjoy. the only problem is the files are in an employee's personal space on the network and is only using a fraction of the user's space limit. How do you handle this situation?

A. Share the music location with the rest of your team.
B. Ask your manager for guidance and policy.
C. Ask the user to remove the music.
D. Remove the music after burning it to a CD for yourself.
E. Do Nothing.
C. Ask the user to remove the music
Why should you document policies?

A. Documentation is bad and could be used against the department later.
B. Because other people cannot read our minds.
C. To aid other team members in understanding the process.
D. You might forget how or why something was done.
E. Answer b. c. and d.
E. Answer b. c. and d.
How do you handle an unethical request?

A. Ignore the request as if it never happened.
B. If this from a good manager, then it is obviously ethical, so treat it like normal work.
C. Get the request in writing or email with more details that you need to work on it.
D. Walk with the person to H.R. to explain your side first, then wait for the requester to back out of the request with a lame excuse.
E. Any of the above answers could apply depending on the circumstances.
C. Get the request in writing or email with more details that you need to work on it.
if you are swamped at work with no sign of relief in sight, what are some things that would help out this issue?

A. Prioritized all tasks.
B. Establish a system that places work in a queue instead of constant interruptions.
C. handle everyone's issue as they arrive, even if it interrupts the current task.
D. Only a. and b.
E. All of the above.
D. Only a. and b.
You almost finished installing all of the software on a new server and realize that your configuration was loaded in reverse and will never work properly. What is the best plan of action at this point?
A. Unload the two configuration items and hope they re-install correctly.
B. Contact the vendors to see if there is a patch that might work.
C. Put the box into production because it will function in most cases.
D. Wipe the boxes clean and perform the installation in the correct order to obtain a stables know state.
E. hand the box to some else to work on and fix.
D. Wipe the boxes clean and perform the installation in the correct order to obtain a stable known state.
The best rule for loading similar configurations on several identical computers is to:

A. Maintain control of each installation through a strictly manual process.
B. Partially automate the installation to maintain some control.
C. Fully automate the process if possible.
D. Use the installation instructions provided by the vendors for installation.
E. Provided detailed documentation to allow each user to customized their own workstation.
C. Fully automate the process if possible.
What is a consideration when considering a server purchase?

A. Input/Output requirements.
B. Available floor space remaining in the server room.
C. Computing requirements to fulfill the job requirements.
D. Only a. and c.
E. All of the above.
E. All of the above.
When working with vendors, the most important consideration is:

A. The prices of hardware are not as important as service contracts.
B. The reliability of the hardware provided by the vendor.
C. how many clients the vendor currently serves.
D. Equipment return policy.
E. Extended equipment warranty.
B. The reliability of the hardware provided by the vendor.
The cost of servers is typically higher than workstations because:

A. Servers are designed and tested to endure heavy computations and long hours of operation without failures.
B. Servers outperform workstations because they contain expensive precious
metals, such as gold.
C. Servers are cheaper than workstations because they are not required to process the intense applications which users required from workstations.
D. management automatically expect that servers are better and have a large budget for all equipment in a server room.
A. Servers are designed and tested to endure heavy computations and long hours of operation with out failures.
What is the difference between a Hot Plug and a Hot Swap device?

A. Hot plug and Hot Swap devices allow hardware swaps while the computer is running. Hot Plug requires a reboot after the swap, and Hot Swap allows the system to access the device with out a reboot.
B. Hot Plug and Hot Swap devices allow hardware swaps while the computer is running. Hot swap requires a reboot after the swap, and Hot Plug allows the system to access the device without a reboot.
C. Hot Plug and Hot Swap devices are different terms for the same function.
D. Hot Swap Devices allow hardware changes while the system is running, where hot plug devices require a shut-down for maintenance, but the computer can stay plugged into the network.
A. Hot plug and Hot Swap devices allow hardware swaps while the computer is running. Hot Plug requires a reboot after the swap, and Hot Swap allows the system to access the device with out a reboot.
When planning a new server configuration, the following points should be considered:

A. Commercial popularity of the operating systems considered.
B. If your last recommendation was ignored.
C. The location of the network switches.
D. The power requirements of each workstation that will rely on the new server.
E. None of the above.
D. The power requirements of each workstation that will rely on the new server.
The best reason to provide remote desktop access to servers is:

A. A badge reader on the data center is prone to failure.
B. Remote access opens the critical areas of an organization to hackers, therefore it should be avoided.
C. Remote access removes the need for any keyboard or monitor in a server room.
D. Administration of multiple servers from anywhere in the organization decreases response time and Simplifies the administrator's life.
D. Administration of multiple servers from anywhere in the organization decreases response time and simplifies the administrator's life.
As a system administrator, what consideration(s) may apply:

A. Workstations fail.
B. Servers Fail.
C. Networks Fail.
D. All of the Above.
D. All of the above.
Define a "Network Appliance" and how it differs from a server.
A network appliance is a device that does one task and one task only. Server can do multiple tasks.
Explain 3 points to consider with redundant power supplies in a server chassis.
1. Cooling & AC has to be implemented with the rack.
2. How long does the backup last for?
3. Does that redundant power supply have its own back-up.
List at least 5 reasons why servers are more expensive than workstations.
1. High performance - Servers has higher performance.
2. Extendibility - they last longer and have more space.
3. No-Side access - its easier to perform maintenance.
4. Racks - you might need racks with the servers.
5. Power - more power is required.
IEEE standards are not commonly used in defining underlying network and server functionality.

A. True
B. False
B. False
When defining naming conventions, set a documented standard even if it is not a standard convention.

A. True
B. False
A. True
A disaster is an event that has a noticeable effect on just a few people, but does not impact a company's ability to do business.

A. True
B. False
B. False
Modern technology and research eliminates potential damage from a direct lighting strike to a server farm.

A. True
B. False
B. False
"Perimeter Security" is intended to keep employees from stealing the servers.

A. True
B. False
B. False
Documentation is a trail of bread crumbs that future administrators can access and obtain information about the current system.

A. True
B. False
A. True
Security is "Sold" to upper management similar to how insurance is sold to homeowners.

A. True
B. False
A. True
When determining the power requirements for a server or data center, the following points are important factors?

A. The power requirements for the server room air conditioning.
B. The number of electrical wall outlets.
C. The number of people that will have office spaces in the data center.
D. None of the above.
A. The power requirements for the server room air conditioning.
Ethernet networks closely resembles the following network topology:

A. Token Ring
B. Star
C. Hierarchical
D. Mesh
B. Star
A "NameSpace" describes:

A. A login name
B. A computer name
C. A network name
D. A generic term used to define the name associated with an object
E. Any of the above.
E. Any of the Above
What can be used to generate documentation?

A. Command line examples
B. Screen shots
C. Any cited source
D. All of the above
D. All of the above
Which of the following is the best practice to follow in preparation for a total server failure or data loss before a failure occurs?

A. Evaluate the extent of the current server crash and all affected areas.
B. Find a suitable server to replace the failed server.
C. Test all backups routinely to ensure data integrity and recovery.
D. All of the above
C. Test all backups routinely to ensure data integrity and recovery.
A "Network Connectivity Policy" is used to:

A.Explain risks associated with unauthorized people gaining access to the network.
B. Describe how the company sets up network connections to another entity or some other shared resources for access by a third party.
C. Describe the process each technician will use to connect an employee's workstation to the company's internal network.
D. None of the above.
B. Describe how the company sets up network connections to another entity or some other shared resources for access by a third party.
A data center is:

A. The place where you keep shared resources.
B. A room that houses only servers, power / UPS units, and dedicated cooling.
C. A facility with ample server racks, cooling, fire suppression, desk space, and work areas for several employees to work on projects for company.
D. A location in the building where the fastest computer can process data.
B. A room that houses only servers, power / UPS units, and dedicated cooling.
Some basics of creating and running a help desk vary between organizations, but what are some fundamental rules for all help desks?

A. Define "Emergency" in writing.
B. Establish an escalation process.
C. Specify how the users can get help.
D. All of the above.
D. All of the above.
If a customer (a user) calls you and asks a really stupid question, what steps should you take to resolve the issue?

A. Tell the user that the error is PEBCAK and just have to reboot.
B. Suggest possibilities the user could follow next time training funds are available.
C. Glean more information from the user and explain the correct answer. you many need to explain why the process works this way so the user understands in the future.
D. All of the above.
C. Glean more information from the user and explain the correct answer. you many need to explain why the process works this way so the user understands in the future.
A security disaster could be minor or major depending on which of the following factors:

A. How many people were involved in the disaster.
B. The coordination of the Security Response Team.
C. Legal implications and public media relations.
D. What time of day the even happens.
C. Legal implications and public media relations.
What tool or utility would you use to determine the name server, owner, and address for a website?

A. NsLookup
B. Whois
C. Ping
D. DNS lookup
A. nslookup
A law enforcement agency contacts your company in regards to a case they are working on. What steps should you take?

A. Cooperate with the agency and obtain as much information from them as you can so you can research and call them back with the information.
B. Contact the legal department. Let the legal department work with the law enforcement agency.
C. verify the agency's existence and determine if this is a social engineering attack.
D. All of the above.
D. All of the above.
During the daily routine, an administrator (you) must be constantly vigilant about:

A. Your privileged access to sensitive corporate information.
B. If the manager is currently watching you.
C. What various users are currently doing.
D. How many hackers have broken through the firewall in the past hour.
A. Your privileged access to sensitive corporate information.
Name The 10 System Administrator's Code of Ethics:
• Professionalism – I will maintain professional in the workplace and will not let personal feeling treat people unfairly.
• Personal integrity – I will be honest and avoid conflicts of interest.
• Privacy- I will access private information only when needed and maintain and protect confidentiality information.
• Laws and policies – I will educate myself and others about the laws and policies of the company regarding my duties.
• Communication - I will communicate with my co-workers and listen and understand them.
• System integrity – I will ensure necessary integrity, for the system I am responsible for.
• Education - I will continue to educate myself, so that I could share my knowledge and experience with others.
• Responsibility to computer community – I will cooperate with the computer community to maintain integrity of the network.
• Social responsibility – I will encourage the writing and adoption of relevant policies and laws consistent with these ethical