Operating systems (1) Flashcards
You have your organization Website hosted in a data centre. The Website contains various applications that internal users use. One morning, you receive a complaint that the users are no longer able to connect to the Website and use the applications. You suspect that there is an issue with the connectivity to the server as the ping command also fails. Which of the following command would you issue to gather the connectivity information?
ipconfig
netstat
tracert
tracert
One method is to ping the server, which you have already done but ping has failed. Next you should run tracert to see the hops that are inbetween your system and the server. It can be suspected that there is an issue with one of the hops, which is not able to forward the traffic to the next hop.
The ipconfig tool displays the current network configuration of a system. The netcat command, also known as NC, is used to make a connection to a server. The tool can help you in finding the status of the system’s TCP and UDP connections. It can also help you reveal the status of all open listening ports and the host’s routing table.
The domain access feature is useful for corporate users. Which among the following is the correct reason?
Domain access provides data backup
Domain access provides added features
Domain access provides resource sharing feature within the domain
Domain access provides resource sharing feature within the domain
Domain access does not provide features, backup, or data integrity.
You are looking to upgrade Windows 7 Home Premium to Windows 10. If you were to do this, which of the following Windows 10 editions will you be able to upgrade to?
Windows 10 Home
Windows 10 Pro
Windows 10 Education
Windows 10 Pro Education
Windows 10 Enterprise
Except for Windows 10 Enterprise you can upgrade Windows 7 Home to the following editions
Windows 10 Home
Windows 10 Pro
Windows 10 Education
Windows 10 Pro Education
In Internet Explorer, you want to enable script debugging. Which of the following will allow you to do this?
Advanced
Programs
General
Content
Privacy
Advanced
The Advanced tab will let you enable script debugging. The Advanced tab allows you to configure various settings, such as multimedia, security and browsing, The Program tab can be used for managing add-ons and HTML editor. The Privacy tab helps you to configure settings, such as pop-up blocker, blocking physical location request and how cookies are managed. The General tab contains settings, such as Accessibility, homepage and browsing history. When you open Internet Options, you are on the General tab by default. In the Appearance section, you can find the Accessibility button, clicking which will invoke the Accessibility settings. The Content tab contains information about the certificates installed on the system.
Using a Windows 10 system, you need to read a drive formatted with HFS+. Which of the following methods should you use?
Download and install HFS Explorer
Use the convert command to convert HFS+ filesystem to NTFS
Install Apple HFS+ Drivers
Windows cannot read an HFS+ formatted drive
Use the fdisk command to create a small primary partition
Download and install HFS Explorer
Install Apple HFS+ Drivers
By default, Windows 10 cannot read an HFS+ formatted drive. However, you can either download and install HFS Explorer or install the Apple HFS+ Drivers. Either one of these methods would allow you to read the HFS+ formatted drives in Windows. You cannot covert an HFS+ filesystem to NTFS using the covert command. Similarly, if you use fdisk command to create a primary partition, you will lose data.
You want to combine the disk space for two disks. The data written on the disks should not be equally distributed amongst them. You have converted both the disks to dynamic disks. Which type of volume should you create now?
Spanned volume
Mirrored volume
RAID 5 volume
Stiped volume
Spanned volume
When you are combining the disk space of two dynamic disks, you are creating a spanned volume. Basic disks do not support this format. Mirrored volume do not span. Two disks are a replica of each other, and therefore, you get the disk space of only one disk. Striped volume are used when you need high input/output performance. The data is written across all disks equally, but it does not offer redundancy. RAID-5 volume cannot be created with two disks. You need a minimum of three disks, and one disk is used for parity while two disks are used for storing data.
Which of the following are examples of DHCP scope options? (Choose two)
DNS server
Spanning Tree Root Bridge
Default gateway
SNMP server IP
OSPF Designated Router
DNS server
Default gateway
DHCP Scope Options are any network configuration parameters, in addition to IP address and subnet mask, that can be assigned to DHCP clients. Over 200 such options are available and each is defined by an option code. For example, option 3 is the default gateway, option 6 is the DNS server and option 42 is the NTP server.
You have a hard drive with a Master Boot Record (MBR) partition. You create three primary partitions and an extended partition. How can you create another extended partition?
Delete two primary partitions and then create the additional extended partition
Delete one the primary partition and then create the additional extended partition
You can only create a single extended partition on a hard drive
You can only create a single extended partition on a hard drive
On a hard drive with MBR partition, you cannot have more than one extended partition. There can be a maximum of four primary partitions or three primary and one extended partition, which can be further broken into logical partitions. If you have already created one extended partition, you will not be able to create another extended partition.
You have a system with two hard drives. Of lately, the system has been low on physical memory. You need to correct this problem. What should you do?
Move the pagefile to the second hard drive
Decrease the pagefile size to a minimum
Let Windows automatically manage the pagefile
Move the pagefile to the second hard drive
A pagefile is used when the physical memory is running low or not available for applications. By default, Windows automatically decides the size of the pagefile depending on the amount of physical RAM installed. Since you have two hard drives, you should move the pagefile to the second hard drive. This will reduce the I/O load on the first hard drive where Windows is installed. Not having a pagefile on the system can cause trouble for the programs. If programs do not have enough memory, then they will not be able to run. Therefore, the paging file takes care of such issues. You should not decrease the pagefile size to a minimum because it needs to be decided by Windows. A smaller sized pagefile may not benefit the system, and more physical RAM will be used.
You need to install Windows on a Mac system and dual boot it. Identify the requirements that must be fulfilled:
- You need to use Boot Camp
- You must use 64-bit Windows
- Mac system must be Intel-based
- There must be minimum 20 GB free space
To install Windows on a Mac system to dual boot it, you need to ensure that the following requirements are met:
- You need to use Boot Camp
- You must use 64-bit Windows
- Mac system must be Intel-based
You need to have at least 30 GB free space to install Windows on a Mac system.
While browsing the Internet using Internet Explorer, various Websites request your physical location. You do not want to be prompted for a physical location. Which tab of Internet Options should you navigate to configure this setting?
Advanced
Programs
General
Content
Privacy
Privacy
You need to navigate to the Privacy tab to configure this setting. The General tab contains settings, such as Accessibility, homepage and browsing history. When you open Internet Options, you are on the General tab by default. In the Appearance section, you can find the Accessibility button, clicking which will invoke the Accessibility settings. The Content tab contains information about the certificate installed on the system. The Programs tab can be used for managing add-ons and HTML editor. The Advanced tab allows you to configure various settings, such as multimedia, security, and browsing.
You need to configure a pre-defined power plan on a laptop that should optimize the CPU usage. It should also optimize the display as and when required. Which of the following power plan would fit the need?
High Performance
Balanced
Power saver
Custom
Balanced
You need to use Balanced Power plan. It optimizes the CPU speed as per the system demand. For example, if there is a high processing application, then it will increase the CPU speed, but when there is no need, the CPU speed is reduced. Power Saver plan reduces the CPU speed all the time and also dims the speed brightness. The High Performance always runs the CPU at high speed. It also increases the screen brightness. The Custom plan is pre-defined and therefore, you need to create power plan.
You need to disable the USB port on a laptop that is being used by a contractor in your organization. The contractor will use a standard user account. You want to ensure that there is no possible method that the contractor can make use of the USB port. Which of the following methods can help you achieve this goal?
(Choose all that apply)
Use the regedit command to edit the required registry key
Apply a restriction using Local Security Policy
Put a physical USB lock on the port
Disable the USB ports in the BIOS
You can use all of these methods to block the USB ports on a laptop:
Use the regedit command to edit the required registry key
Apply a restriction using Local Security Policy
Put a physical USB lock on the port
Disable the USB ports in the BIOS
An audio clip is being played in the windows media center. The clip needs to be stopped for a short while and then it has to be played from the point where it was stopped. Based on the function, choose the button which should be used to stop the clip?
Play previous
Play/Pause
Stop
Play/Pause
The Play/Pause button starts/resumes the selected track.
You need to validate the Group Policy settings on a domain system. You need to verify the Group Policy Objects (GPOs) applied and not applied on the system and to which of the groups the user part of. What should you do?
Open the command prompt and run the gpresult command with the /SCOPE and /USER parameters
Open the gpedit.msc console to get the required information
Open the Group Policy Management Console (GPMC) and locate the required information from the GPOs
Run the gpupdate command with the /R parameter in the command prompt
Open the command prompt and run the gpresult command with the /SCOPE and /USER parameters
To be able to verify if the GPO has been applied or not on a system, you need to open the command prompt and run the gpresult command with the /SCOPE and /USER parameters. The /SCOPE parameter defines whether it is a COMPUTER or USER or both. The /USER parameter defines the username for which the GPO information is required. The GPMC console is used to import, export, copy, paste, backup and restore GPOs. It can also print reports, but it does not provide information about a specific system. The gpupdate /force command is used to immediately apply one or more GPOs on a system. The gpedit.msc console is used to edit the Group Policy, but this command also does not meet the requirements stated in the scenario.
You have recently configured several new servers in the DMZ zone. A firewall is configured between the internal network and the DMZ zone. When you attempt to ping them from the internal network, you are not able to get any response. You have verified that the servers are up and running. What could be the possible reason?
The DMZ servers cannot receive ICMP packets from the internal network
A firewall is blocking the ICMP packets
The ping packet size is larger than required
A firewall is blocking the ICMP packets
In this scenario there is a firewall between the internal and the DMZ zone. The only possible reason why you are not able to ping the servers in the DMZ zone is that the firewall is blocking the ICMP packets.
Since there is a firewall between the internal and the DMZ zone, there is connectivity, but it is limited in the number of ports and allowed services to the DMZ zone. Remaining two options are not correct.
You run the following command on a CentOS system: grep swap /etc/fstab
However, there is no output. You need to enable swap on boot permanently. Which are the steps that you must perform? (Choose all that apply)
Run the mkswap /swap command
Add a swap partition in the /etc/fstab file
Run the swapon -a command
Run the swapon /dev/ command
Run the mkswap /swap command
Add a swap partition in the /etc/fstab file
To enable swap partition, you need first to run the mkswap /swap.dat command.
Then, you need to add the following statement in the /etc/fstab file:
/dev/sda1 none swap sw 0 0
You can replace sad1 with the partition on which you want to have the swap setup. After you save the /etc/fstab file, then you need to run the swapon -a command.
The swapon /dev/ command can enable a swap partition only for the current session.
You need to setup a small network in which each system will manage on its own shares. Users should be allowed to share files with the other computers in the network. They should be able to create individual shares. Which of the following would be most appropriate?
Domain
Workgroup
NFS
Homegroup
Workgroup
You need to setup a workgroup, which can consist of up to 20 computers. Each computer has its own user accounts and shares. It uses peer-to-peer networking in sharing files and folders.
Homegroup network is based on the workgroup network, but it is protected by a password. Any computer joining the homegroup needs to know the password. You cannot share individual files and folders to different users. A domain consists of a centralized server known as a domain controller that contains the user and computer accounts. Each domain has its own security boundaries. A domain user can be assigned access to a network share running on a domain computer. NFS allows you share files using a central system. Each computer cannot share the files with NFS.
You manage a small star network topology. What will happen of one of the nodes in the topology fails?
The nodes are automatically removed from the topology
Rest of the nodes will continue to function
The whole network goes down
Rest of the nodes will continue to function
IN a network star topology, each network host is connected to a central network device with a point-to-point connection. So, it can be said that every host is directly connected to every other host with the help of the central network device. The network does not necessarily have to resemble a star to be classified as a star network, but all the nodes on the network must be connected to one central device. All traffic that traverses the network passes through this central device, if one node fails in this network, the remaining nodes continue to function without any issue.
What is the most appropriate method to set the USB as a primary boot device?
Remove all other boot devices
Disable all other boot devices except the USB
Keep the USB option at the top of the boot device list
Keep the USB option at the top of the boot device list
BIOS contains a list of boot devices. The device present at the top of the list is treated as the default boot device. Though the other methods may work, setting a USB device at the top is the most appropriate way.
You need to edit a PHP file on your system, you do not have administrative permissions on the system. What should you do?
Use the gedit editor
Download and install a PHP editor
Download and install Notepad++
Edit the file in Notepad
Edit the file in Notepad
You can edit the PHP in Notepad. Since you do not have administrative privileges, you will not be able to install a PHP editor or Notepad++. The gedit editor does not exist on Windows. It is part of various Linux flavours.
You need to view the SSID name foe a specific wireless network. Which of the following command should you use?
ss
ethtool
iwconfig
nmcli
iwconfig
To view the SSID name for a specific wireless network, you need to use the iwconfig command, which is equivalent to the ifconfig command that displays information for the Ethernet adapters.
The ethtool command when specified with a network adapter name, prints the current settings. The nmcli command helps manage the networks devices via the command line. The ss command can be used as a replacement of the nestat command and can display network statistics from the kemel directly.
There are multiple applications in a mac system on which you are working. You want to move these applications between the desktops. Which of the following applications will help you do this?
Screen Sharing
Time Machine
Mission Control
Terminal
Mission Control
To move open application between the desktop, you use Mission Control. Screen Sharing is an equivalent of RDP in Mac. A shell is a command line in Linux and Terminal is an equivalent of it in Mac. Time Machine is a backup utility.
You are running a Linux system. You use the top command to view the currently running processes. Based on the output, you want to kill a process with process ID 2500. However, you want the process to release its resources gracefully and save its progress. Which of the following command should you run to achieve this?
kill - SIGSTOP 2500
kill - SIGTERM 2500
kill - SIGKILL 2500
kill - SIGTERM 2500
Out of the given choices, the following command will allow the process to release its resources and save its progress before exiting: kill - SIGTERM 2500
With this command, the process is not forced to stop immediately
With the following command, the process is forced to stop immediately and is not allowed to save its progress or perform cleanup: kill - SIGKILL 2500