Module 1 Test Flashcards

1
Q

The United States Air Force was able to install Linux on a popular gaming console and then connect over 1,700 of these systems together to work as one big supercomputer. Which of the following types of technologies did they implement?
a. herding
b. cloud computing
c. group computing
d. clustering

A

d. clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do not charge for the software but also do not distribute the source code along with it?
a. shareware
b. freeware
c. malware
d. tryware

A

b. freeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet?
a. SFTP
b. IMAP
c. SMTP
d. NTP

A

d. NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
a. SaaS
b. PaaS
c. IaaS
d. MaaS

A

a. SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following server roles does Apache perform?
a. web server
b. mail server
c. name server
d. certificate authority

A

a. web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would be a term applicable to an e-mail program on a workstation that is used to view email?
a. MTA x
b. MDA x
c. MUA
d. MBR

A

c. MUA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly delivered to users requesting the same resource while at the same time reducing the burden on the external network connection to the Internet for an organization?
a. file server
b. DNS server
c. proxy server
d. DHCP server

A

c. proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following types of encryption uses a pair of keys known as a public and private?
a. symmetric
b. asymmetric
c. SHA1 hashing
d. message digest

A

b. asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly