P1B2 Flashcards

Operating Systems (90 cards)

1
Q

Which hardware device holds the majority of ports, distributes power from the power supply, and other hardware plugs into it both directly and in directly?

A

Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which hardware device is responsible for processing instructions?

A

CPU (Central Processing Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe memory when information is lost after power being removed

A

Volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information that can be written to memory is _____

A

Writable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical connection that carry data and control signals within a computer system are known as ___

A

BUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unprivileged, the running of application will trigger this mode

A

User level and/or isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privileged and the running of the core operating system components will trigger this mode

A

Kernel Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Components of the Windows OS Kernel

A

Hardware Abstraction Layer, Kernel (Core), Device Drivers, Windows/Graphics, Executive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hierarchal scheme that directs how an OS stores and retrieves data on and off storage

A

File System or Data Structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Factors that made NTFS an upgrade over FAT 32

A

Redundancy, Security, Compression, Encryption, Disk Quotas, Cluster Sizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a drive go from blank to a user OS?

A

Partitioning and Formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of electronically subdividing the physical hard drive into smaller units

A

Partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The act of preparing the partition for use

A

Formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identifies bad sectors to eliminate future use and increase file system accuracy

A

Error Checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Locates and consolidates fragmented files on a partition

A

Defragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phase 1 of the boot process (Windows)

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phase 2 of the boot process (Windows)

A

OS Loader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phase 3 of the boot process (Windows)

A

OS Initialization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Windows database that stores configuration information necessary for system operations

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Manages network services, data security, admin/user permissions, implements domain controller and backend services

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Provides client-oriented OS/applications and relies on server’s network services

A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Active Directory Domain Services (ADDS) – A server role allowing administrators to manage and store information about resources from a network, as well as application data, in a distributed data base
Domain Name System (DNS) – A hierarchical distributed database which provides a service that resolves a hostname to an internet protocol (IP) address
Dynamic Host Configuration Protocol (DHCP) – A communications protocol used to centrally manage the process of IP address and option assignment (DORA – Discover, Offer, Request, Acknowledge)
Internet Information Services (IIS) – Web server software package, designed for Windows Server, used for hosting websites and other content

A

Server Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Resolves a hostname to an Internet Protocol (IP) address

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Communications protocol used to centrally manage the process of IP address and option assignment

A

Dynamic host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Measures the roles effectiveness, trustworthiness, and reliability in: Security, Performance, Configuration, Policy, Operation, Pre/Post Deployment, BPA Prerequisites
Server Capabilities
26
Unique value of variable length used to identify a trustee
SID (Secruity Identifier)
27
Process of copying data in case lost or damaged
Backup
28
Recovery
Process of replacing data that has been lost or damaged
29
Automation
Backups through task schedule or AD Snapshots via scripts
30
Variants (Types) of Linux
``` Ubuntu Fedora Red hat Enterprise Debian Kali ```
31
Server, Firewall, and Desktop describe the roles for which OS?
Linux
32
How is Linux OS broken up?
Libraries, Modules, Utilities, Kernel, Hardware
33
``` Processes include: Memory File System Error handling Input/output Resource Allocation ```
What job(s) does Linux OS Kernel in memory
34
Current file system type used in Linux OS
Ext4 (Fourth Extended File System)
35
Linux File Structure: What are the user categories
Owner, Group, and Others
36
What type of Linux user has complete control? (More than admin)
Root user
37
The (r) file permission allows ...
Read (r) read or copy a file
38
The (w) file permission allows ..
Write (w) alter contents of a file
39
The (x) file permission allows...
Execute (x) execute an executable file
40
NTLM (i.e. Windows Authentication) is what type of protocol
Challenge/response-based authentication protocol
41
Username and password are hashed before being sent across the network would be a description of which authentication protocol
NTLM (i.e. Windows Authentication)
42
Uses strong cryptography so client can prove its identity to a server (and vice versa) across an insecure network connection. This best describes what type of authentication protocol?
Kerberos
43
Kerberos Must have a(n) _______ domain with a primary ________.
active directory, domain controller
44
Three players involved in Kerberos
Client Server Key Distribution Center (KDC)
45
issues ticket-granting tickets (TGTs) for connection to the ticket-granting service in its own domain or in any trusted domain
Authenticate Service (AS): Kerberos Key Distribution Center
46
issues tickets for connection to computers in its own domain
Ticket-Granting Service (TGS): Kerberos Key Distribution Center
47
Describe the Kerberos process diagram
https://docs.google.com/drawings/d/1MX2uV-G6jkauClBOErKdha1uPVXC2wQKb002wxptIXA/edit
48
How many runlevels (mode of operations) does Linux have?
7
49
Single user mode Command Line interface Describe the characteristics of which run level in Linux?
Level 1
50
Multiuser mode Command-line Interface Networking enabled Describes the characteristics of which run level in Linux?
Level 3
51
Multiuser mode Graphical user interface Networking enabled Describes the characteristics of which run level in Linux?
Level 5
52
Describe the different Linux directories
``` /home /etc /dev /boot /bin /lib /proc /sbin /user /var ```
53
The three categories of vulnerabilities include
High, Medium, and Low
54
/etc/shadow describes
Linux OS file where passwords are kept
55
_______ can be described as the process of defending
Hardening
56
______ can be described as the process of creating a new subshell and running a command process within it (gets its own PID)
Forking
57
This command is known as the parent of all processes (Linux OS)
"init" or "systemd"
58
List the 3 phases of the Linux boot process
1. BIOS 2. Bootloader 3. Kernel
59
Command to send a request and elicit a response from a network host
ping
60
Command to display the route packet trace to a network host
traceroute
61
Command to display information about network connections, routing tables, interface statistics
netstat
62
Command to send domain name query packets to name servers for debugging or testing
dig
63
Command like dig but provides simple quick information
host
64
_____ is the process of creating a software based representation of something rather than a physical one
Virtualization
65
A _____ is a piece of software or hardware that creates and runs virtual machines
Hypervisor
66
Type 1 hypervisors are also referred to as _______ and are more practical for large enterprises.
Baremetal
67
Type _ hypervisors are hosted and more beneficial for _____.
2, individuals
68
A ___ ___ is a machine that emulates a physical computer and is managed by a hypervisor for access to actual physical resources.
Virtual machine (VM)
69
Multiuser mode Command-line Interface Networking disabled Describes the characteristics of which run level in Linux?
Level 2
70
Virtual Terminology: Microsoft vs VMware Migration Microsoft - Live Migration VMware - _______
vMotion
71
Virtual Terminology: Microsoft vs VMware Storage Provisioning Microsoft - _____, _______ VMware - thin, thick
dynamic, fixed
72
Virtual Terminology: Microsoft vs VMware Networking Microsoft - ___,_____,____ VMware - host-only, NAT, bridged
private, internal, external
73
DAS represents the acronym for ___ ____ _____?
Direct Attached Storage
74
Direct Attached Storage provides ___ and ____ level access.
file, block
75
NAS represents the acronym for ___ ____ ___?
Network Attached Storage
76
This type of storage provides a file system anyone on the network can access
Network Attached Storage (NAS)
77
This level of access allows users to access the exact same file, similar to the way a ShareDrive works
File level access
78
This level of access uses a server with massive storage similar to the way Google Drive works
Block level access
79
SAN represents the acronym for ___ ___ ___?
Storage Area Network (SAN)
80
Provides blocks of storage unique to each device. Uses its own network infrastructure for sending and receiving storage traffic best describes...
Storage Area Network (SAN)
81
Storage technology that combines multiple hard disks into a single logical unit
Redundant Array of Independent Disks (RAID)
82
RAID technique that improves read and write speed but provides no redundancy
Striping
83
Describe the mirroring RAID technique
improves read, write remains the same, and adds redundancy
84
RAID technique that improves read and write speed and provides redundancy with fault tolerance
Parity
85
Storage Provisioning: This type of provisioning provides a fixed amount of storage space or reserved space
Thick (Fixed)
86
Storage Provisioning: Describe Thin (Dynamic) provisioning
- Combine VM allocated space may exceed actual storage space (overprovisioning) so it requires monitoring
87
Items to consider as it relates to virtual machines
Host (Hypervisor) Space (Storage) Processor (Oversubscribing) Memory
88
Process of combining physical network resources/functionality into single logical entity
Network Virtualization
89
What are the two tools involved with user management?
- System Center Operations Manager (SCOM) | - Best Practice Analyzer (BPA)
90
User Interface (Shells) 2 types
Graphic User Interface (GUI) | Command Line interface (CLI)