Operating systems (1) Flashcards

1
Q

You have your organization Website hosted in a data centre. The Website contains various applications that internal users use. One morning, you receive a complaint that the users are no longer able to connect to the Website and use the applications. You suspect that there is an issue with the connectivity to the server as the ping command also fails. Which of the following command would you issue to gather the connectivity information?

ipconfig

netstat

tracert

A

tracert

One method is to ping the server, which you have already done but ping has failed. Next you should run tracert to see the hops that are inbetween your system and the server. It can be suspected that there is an issue with one of the hops, which is not able to forward the traffic to the next hop.
The ipconfig tool displays the current network configuration of a system. The netcat command, also known as NC, is used to make a connection to a server. The tool can help you in finding the status of the system’s TCP and UDP connections. It can also help you reveal the status of all open listening ports and the host’s routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The domain access feature is useful for corporate users. Which among the following is the correct reason?

Domain access provides data backup

Domain access provides added features

Domain access provides resource sharing feature within the domain

A

Domain access provides resource sharing feature within the domain

Domain access does not provide features, backup, or data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are looking to upgrade Windows 7 Home Premium to Windows 10. If you were to do this, which of the following Windows 10 editions will you be able to upgrade to?

Windows 10 Home

Windows 10 Pro

Windows 10 Education

Windows 10 Pro Education

Windows 10 Enterprise

A

Except for Windows 10 Enterprise you can upgrade Windows 7 Home to the following editions

Windows 10 Home

Windows 10 Pro

Windows 10 Education

Windows 10 Pro Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Internet Explorer, you want to enable script debugging. Which of the following will allow you to do this?

Advanced

Programs

General

Content

Privacy

A

Advanced

The Advanced tab will let you enable script debugging. The Advanced tab allows you to configure various settings, such as multimedia, security and browsing, The Program tab can be used for managing add-ons and HTML editor. The Privacy tab helps you to configure settings, such as pop-up blocker, blocking physical location request and how cookies are managed. The General tab contains settings, such as Accessibility, homepage and browsing history. When you open Internet Options, you are on the General tab by default. In the Appearance section, you can find the Accessibility button, clicking which will invoke the Accessibility settings. The Content tab contains information about the certificates installed on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using a Windows 10 system, you need to read a drive formatted with HFS+. Which of the following methods should you use?

Download and install HFS Explorer

Use the convert command to convert HFS+ filesystem to NTFS

Install Apple HFS+ Drivers

Windows cannot read an HFS+ formatted drive

Use the fdisk command to create a small primary partition

A

Download and install HFS Explorer

Install Apple HFS+ Drivers

By default, Windows 10 cannot read an HFS+ formatted drive. However, you can either download and install HFS Explorer or install the Apple HFS+ Drivers. Either one of these methods would allow you to read the HFS+ formatted drives in Windows. You cannot covert an HFS+ filesystem to NTFS using the covert command. Similarly, if you use fdisk command to create a primary partition, you will lose data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You want to combine the disk space for two disks. The data written on the disks should not be equally distributed amongst them. You have converted both the disks to dynamic disks. Which type of volume should you create now?

Spanned volume

Mirrored volume

RAID 5 volume

Stiped volume

A

Spanned volume

When you are combining the disk space of two dynamic disks, you are creating a spanned volume. Basic disks do not support this format. Mirrored volume do not span. Two disks are a replica of each other, and therefore, you get the disk space of only one disk. Striped volume are used when you need high input/output performance. The data is written across all disks equally, but it does not offer redundancy. RAID-5 volume cannot be created with two disks. You need a minimum of three disks, and one disk is used for parity while two disks are used for storing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following are examples of DHCP scope options? (Choose two)

DNS server

Spanning Tree Root Bridge

Default gateway

SNMP server IP

OSPF Designated Router

A

DNS server

Default gateway

DHCP Scope Options are any network configuration parameters, in addition to IP address and subnet mask, that can be assigned to DHCP clients. Over 200 such options are available and each is defined by an option code. For example, option 3 is the default gateway, option 6 is the DNS server and option 42 is the NTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a hard drive with a Master Boot Record (MBR) partition. You create three primary partitions and an extended partition. How can you create another extended partition?

Delete two primary partitions and then create the additional extended partition

Delete one the primary partition and then create the additional extended partition

You can only create a single extended partition on a hard drive

A

You can only create a single extended partition on a hard drive

On a hard drive with MBR partition, you cannot have more than one extended partition. There can be a maximum of four primary partitions or three primary and one extended partition, which can be further broken into logical partitions. If you have already created one extended partition, you will not be able to create another extended partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have a system with two hard drives. Of lately, the system has been low on physical memory. You need to correct this problem. What should you do?

Move the pagefile to the second hard drive

Decrease the pagefile size to a minimum

Let Windows automatically manage the pagefile

A

Move the pagefile to the second hard drive

A pagefile is used when the physical memory is running low or not available for applications. By default, Windows automatically decides the size of the pagefile depending on the amount of physical RAM installed. Since you have two hard drives, you should move the pagefile to the second hard drive. This will reduce the I/O load on the first hard drive where Windows is installed. Not having a pagefile on the system can cause trouble for the programs. If programs do not have enough memory, then they will not be able to run. Therefore, the paging file takes care of such issues. You should not decrease the pagefile size to a minimum because it needs to be decided by Windows. A smaller sized pagefile may not benefit the system, and more physical RAM will be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to install Windows on a Mac system and dual boot it. Identify the requirements that must be fulfilled:

  1. You need to use Boot Camp
  2. You must use 64-bit Windows
  3. Mac system must be Intel-based
  4. There must be minimum 20 GB free space
A

To install Windows on a Mac system to dual boot it, you need to ensure that the following requirements are met:

  1. You need to use Boot Camp
  2. You must use 64-bit Windows
  3. Mac system must be Intel-based

You need to have at least 30 GB free space to install Windows on a Mac system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

While browsing the Internet using Internet Explorer, various Websites request your physical location. You do not want to be prompted for a physical location. Which tab of Internet Options should you navigate to configure this setting?

Advanced

Programs

General

Content

Privacy

A

Privacy

You need to navigate to the Privacy tab to configure this setting. The General tab contains settings, such as Accessibility, homepage and browsing history. When you open Internet Options, you are on the General tab by default. In the Appearance section, you can find the Accessibility button, clicking which will invoke the Accessibility settings. The Content tab contains information about the certificate installed on the system. The Programs tab can be used for managing add-ons and HTML editor. The Advanced tab allows you to configure various settings, such as multimedia, security, and browsing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to configure a pre-defined power plan on a laptop that should optimize the CPU usage. It should also optimize the display as and when required. Which of the following power plan would fit the need?

High Performance

Balanced

Power saver

Custom

A

Balanced

You need to use Balanced Power plan. It optimizes the CPU speed as per the system demand. For example, if there is a high processing application, then it will increase the CPU speed, but when there is no need, the CPU speed is reduced. Power Saver plan reduces the CPU speed all the time and also dims the speed brightness. The High Performance always runs the CPU at high speed. It also increases the screen brightness. The Custom plan is pre-defined and therefore, you need to create power plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You need to disable the USB port on a laptop that is being used by a contractor in your organization. The contractor will use a standard user account. You want to ensure that there is no possible method that the contractor can make use of the USB port. Which of the following methods can help you achieve this goal?
(Choose all that apply)

Use the regedit command to edit the required registry key

Apply a restriction using Local Security Policy

Put a physical USB lock on the port

Disable the USB ports in the BIOS

A

You can use all of these methods to block the USB ports on a laptop:

Use the regedit command to edit the required registry key

Apply a restriction using Local Security Policy

Put a physical USB lock on the port

Disable the USB ports in the BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An audio clip is being played in the windows media center. The clip needs to be stopped for a short while and then it has to be played from the point where it was stopped. Based on the function, choose the button which should be used to stop the clip?

Play previous

Play/Pause

Stop

A

Play/Pause

The Play/Pause button starts/resumes the selected track.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to validate the Group Policy settings on a domain system. You need to verify the Group Policy Objects (GPOs) applied and not applied on the system and to which of the groups the user part of. What should you do?

Open the command prompt and run the gpresult command with the /SCOPE and /USER parameters

Open the gpedit.msc console to get the required information

Open the Group Policy Management Console (GPMC) and locate the required information from the GPOs

Run the gpupdate command with the /R parameter in the command prompt

A

Open the command prompt and run the gpresult command with the /SCOPE and /USER parameters

To be able to verify if the GPO has been applied or not on a system, you need to open the command prompt and run the gpresult command with the /SCOPE and /USER parameters. The /SCOPE parameter defines whether it is a COMPUTER or USER or both. The /USER parameter defines the username for which the GPO information is required. The GPMC console is used to import, export, copy, paste, backup and restore GPOs. It can also print reports, but it does not provide information about a specific system. The gpupdate /force command is used to immediately apply one or more GPOs on a system. The gpedit.msc console is used to edit the Group Policy, but this command also does not meet the requirements stated in the scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have recently configured several new servers in the DMZ zone. A firewall is configured between the internal network and the DMZ zone. When you attempt to ping them from the internal network, you are not able to get any response. You have verified that the servers are up and running. What could be the possible reason?

The DMZ servers cannot receive ICMP packets from the internal network

A firewall is blocking the ICMP packets

The ping packet size is larger than required

A

A firewall is blocking the ICMP packets

In this scenario there is a firewall between the internal and the DMZ zone. The only possible reason why you are not able to ping the servers in the DMZ zone is that the firewall is blocking the ICMP packets.
Since there is a firewall between the internal and the DMZ zone, there is connectivity, but it is limited in the number of ports and allowed services to the DMZ zone. Remaining two options are not correct.

17
Q

You run the following command on a CentOS system: grep swap /etc/fstab
However, there is no output. You need to enable swap on boot permanently. Which are the steps that you must perform? (Choose all that apply)

Run the mkswap /swap command

Add a swap partition in the /etc/fstab file

Run the swapon -a command

Run the swapon /dev/ command

A

Run the mkswap /swap command

Add a swap partition in the /etc/fstab file

To enable swap partition, you need first to run the mkswap /swap.dat command.
Then, you need to add the following statement in the /etc/fstab file:

/dev/sda1 none swap sw 0 0

You can replace sad1 with the partition on which you want to have the swap setup. After you save the /etc/fstab file, then you need to run the swapon -a command.

The swapon /dev/ command can enable a swap partition only for the current session.

18
Q

You need to setup a small network in which each system will manage on its own shares. Users should be allowed to share files with the other computers in the network. They should be able to create individual shares. Which of the following would be most appropriate?

Domain

Workgroup

NFS

Homegroup

A

Workgroup

You need to setup a workgroup, which can consist of up to 20 computers. Each computer has its own user accounts and shares. It uses peer-to-peer networking in sharing files and folders.
Homegroup network is based on the workgroup network, but it is protected by a password. Any computer joining the homegroup needs to know the password. You cannot share individual files and folders to different users. A domain consists of a centralized server known as a domain controller that contains the user and computer accounts. Each domain has its own security boundaries. A domain user can be assigned access to a network share running on a domain computer. NFS allows you share files using a central system. Each computer cannot share the files with NFS.

19
Q

You manage a small star network topology. What will happen of one of the nodes in the topology fails?

The nodes are automatically removed from the topology

Rest of the nodes will continue to function

The whole network goes down

A

Rest of the nodes will continue to function

IN a network star topology, each network host is connected to a central network device with a point-to-point connection. So, it can be said that every host is directly connected to every other host with the help of the central network device. The network does not necessarily have to resemble a star to be classified as a star network, but all the nodes on the network must be connected to one central device. All traffic that traverses the network passes through this central device, if one node fails in this network, the remaining nodes continue to function without any issue.

20
Q

What is the most appropriate method to set the USB as a primary boot device?

Remove all other boot devices

Disable all other boot devices except the USB

Keep the USB option at the top of the boot device list

A

Keep the USB option at the top of the boot device list

BIOS contains a list of boot devices. The device present at the top of the list is treated as the default boot device. Though the other methods may work, setting a USB device at the top is the most appropriate way.

21
Q

You need to edit a PHP file on your system, you do not have administrative permissions on the system. What should you do?

Use the gedit editor

Download and install a PHP editor

Download and install Notepad++

Edit the file in Notepad

A

Edit the file in Notepad

You can edit the PHP in Notepad. Since you do not have administrative privileges, you will not be able to install a PHP editor or Notepad++. The gedit editor does not exist on Windows. It is part of various Linux flavours.

22
Q

You need to view the SSID name foe a specific wireless network. Which of the following command should you use?

ss

ethtool

iwconfig

nmcli

A

iwconfig

To view the SSID name for a specific wireless network, you need to use the iwconfig command, which is equivalent to the ifconfig command that displays information for the Ethernet adapters.
The ethtool command when specified with a network adapter name, prints the current settings. The nmcli command helps manage the networks devices via the command line. The ss command can be used as a replacement of the nestat command and can display network statistics from the kemel directly.

23
Q

There are multiple applications in a mac system on which you are working. You want to move these applications between the desktops. Which of the following applications will help you do this?

Screen Sharing

Time Machine

Mission Control

Terminal

A

Mission Control

To move open application between the desktop, you use Mission Control. Screen Sharing is an equivalent of RDP in Mac. A shell is a command line in Linux and Terminal is an equivalent of it in Mac. Time Machine is a backup utility.

24
Q

You are running a Linux system. You use the top command to view the currently running processes. Based on the output, you want to kill a process with process ID 2500. However, you want the process to release its resources gracefully and save its progress. Which of the following command should you run to achieve this?

kill - SIGSTOP 2500

kill - SIGTERM 2500

kill - SIGKILL 2500

A

kill - SIGTERM 2500

Out of the given choices, the following command will allow the process to release its resources and save its progress before exiting: kill - SIGTERM 2500
With this command, the process is not forced to stop immediately

With the following command, the process is forced to stop immediately and is not allowed to save its progress or perform cleanup: kill - SIGKILL 2500

25
With the most recent update of Windows 10, you are able to find the UAC settings. You decide to use the msconfig tool to launch the UAC settings. Which tab in msconfig should you use for this purpose? Services Startup Tools General Boot
Tools You need to use Tools tab for this purpose. It contains a list of Microsoft tools that you can select and click Launch. The General tab contains the Selective startup option. You can select this option and the load system services. Load startup items, and Use original boot configuration options are selected automatically. The Boot tab has boot configurations, which when edited, make changes to the boot.ini file. The Services tab allows you to enable or disable services. The Startup tab does not contain any configuration. The contents of this tab have been moved to Task Manager. This tab contains the link to Task Manager.