Week 2 – Network and Infrastructure Services

1. Which of the following are considered part of the physical infrastructure service? Check all that apply.

Answers

·        Laptop

·        Rack server

·        Desktop

·        Operating systems

2. Which of the following are considered a network service? Check all that apply.

Answers

·        DNS

·        Email server

·        Blade server

·        Wireless Internet

3. Amazon Web Services, Linode, Windows Azure, and Google Compute Engine are examples of ________.

Answers

·        NaaS providers

·        Shopping places

·        Computer brands

·        IaaS Providers

Explanation: Examples of cloud computing platforms or cloud service providers include Amazon Web Services, Linode, Google Compute Engine, and Microsoft Azure (previously Windows Azure). They provide Infrastructure as a Service (IaaS) and other cloud services, which enable customers to get access to and make use of computer resources, storage, and services via the internet without the need for real hardware or the administration of physical infrastructure.

4. Which of the following are considered a software service? Check all that apply.

Answers

·        Wireless Internet

·        Word processors

·        Email applications

·        Chat applications

5. What type of service is an all-in-one solution to building and deploying a web application?

Answers

·        PaaS

·        NaaS

·        SaaS

·        IaaS

Explanation: Platform as a Service (PaaS) is a term that is often used to refer to a solution that includes both the construction and deployment of a web application. PaaS gives users access to a platform that simplifies the process of application creation, deployment, and administration by providing the necessary software, services, and infrastructure. Without having to worry about the underlying infrastructure, developers are free to concentrate on creating code and adding features while using a platform as a service (PaaS).

Heroku, Google App Engine, and Microsoft Azure App Service are a few examples of providers that fall within the PaaS category. It is often simpler for developers to construct and deploy online applications when using these platforms since they provide a variety of services, such as web hosting, database administration, scalability capabilities, and development tools.

6. Which one of the following operating systems would be best suited for running a server?

Answers

·        Ubuntu Server

·        MacOS

·        Windows 10

·        Ubuntu

Explanation: There are many different operating systems that are capable of running servers, and the selection of one should be based on a number of considerations, including the particular use cases, personal preferences, and level of technical skill. Linux distributions, in particular those belonging to the Debian/Ubuntu and CentOS/RHEL families, are often used in server settings. You may be thinking about making use of one or more of these possibilities.

7. Which of the following are benefits of virtualizing servers? Check all that apply.

Answers

·        Easier maintenance.

·        Low RAM memory requirement.

·        Better performance than a dedicated server.

·        Better hardware resource utilization.

8. Which of the following are ways that can be used to run services?

Answers

·        Virtualized instance on a server.

·        Dedicated hardware

·        VPN

·        SSH

9. Which of the following is needed in order to use SSH to connect to a machine? Check all that apply.

Answers

·        A VPN connection.

·        An SSH server on the machine you want to connect to.

·        A virtual server to connect to.

·        An SSH client on the machine from which the connection begins.

10. Which of the following are samples of remote access tools? Select all that apply.

Answers

·        RAM

·        RDP

·        OpenSSH

·        WinRM

11. What is one benefit of using TFTP over SFTP?

Answers

·        Added security

·        Simpler transfer without authentication

·        The encrypted transfer of data

·        The user authentication requirement

Explanation: However, it is essential to keep in mind that although TFTP has certain benefits in terms of its ease of use, it does not have the security protections that are offered by SFTP. Since TFTP does not include any encryption, authentication, or other security procedures, using it for the transmission of safe and sensitive data is not the best idea. SFTP, on the other hand, offers an alternative that is more secure because to its capabilities in the areas of encryption and authentication. Which protocol, TFTP or SFTP, should be used to transfer files depends on the particular needs of the use case as well as any relevant security concerns.

12. What service can you use to keep time synchronized across the machines on your fleet?

Answers

·        FTP

·        Kerberos

·        NTP

·        SFTP

Explanation: You may use the Network Time Protocol (NTP) service to maintain the time on all of the computers in a fleet synced with one another. NTP is a protocol that was developed to synchronize the time on all of the computers that are connected to a network. It makes it possible for machines to keep precise and consistent time, which is essential for a wide variety of applications and services that depend on synchronized time.

13. What features does a proxy offer? Check all that apply.

Answers

·        Network privacy

·        Network traffic monitoring

·        Internet traffic filtering

·        The ability for employees to share information more easily

14. The ability for employees to share information more easily

Answers

·        DHCP

·        DNS

·        NTP

·        SFTP

15. If you don't want to use static IP addresses, but want to dynamically assign IP addresses to computers instead, what network protocol can you use?

Answers

·        TFTP

·        Kerberos

·        NTP

·        DHCP

Explanation: You may utilize the Dynamic Host Configuration Protocol (DHCP) if you wish to dynamically assign IP addresses to computers rather than using static IP addresses. This can be done by avoiding using static IP addresses. A network protocol known as DHCP is responsible for the automated assignment of IP addresses and other information on the setup of a network to devices that are connected to that protocol.

This kind of dynamic IP address assignment makes it possible to have a more flexible and automated administration of IP addresses inside a network, which in turn reduces the need for any human setup. In order to streamline the procedure of joining devices to a network, DHCP is a protocol that is often used in private as well as public network.

 

16. Which of these is an advantage of using Infrastructure as a Service (or IaaS) solutions?

Answers

·        It lets users access software online without having to install it on individual systems.

·        It provides the resources users need without maintaining any actual hardware.

·        The user can keep files on a local network.

·        It centralizes the organization’s users and computers in one location, and the organization can add, update, or remove users and computers.

Explanation: IaaS makes available on-demand computing resources that are both scalable and adaptable. The size of an organization's infrastructure may be readily scaled up or down to meet the organization's evolving requirements. Because of this flexibility, it is possible to efficiently use resources, optimize costs, and react to changing workloads without having to make major up-front expenditures in physical hardware. Users have the ability to provide and de-provision virtual machines, storage, and networking resources according to their requirements, which provides agility in the management of IT infrastructure.

 

17. What type of cloud service allows app developers to build code, store information in a database and serve their applications from a single place?

Answers

·        SaaS (Software as a Service)

·        PaaS (Platform as a Service)

·        DaaS (Directory as a Service)

·        IaaS (Infrastructure as a Service)

Explanation: PaaS is an abbreviation for "platform as a service," which refers to a specific kind of cloud service that enables application developers to generate code, store information in a database, and deliver their apps all from a single location. PaaS makes available a platform that contains all of the necessary development tools, infrastructure, and services for creating, testing, deploying, and hosting software applications. It makes it possible for developers to concentrate on code and application development by abstracting the difficulties involved in maintaining the underlying infrastructure.

 

18. Which of the following is a benefit of virtualization compared to using dedicated hardware?

Answers

·        User experience

·        Maintenance

·        Security

·        Performance

Explanation: A single physical server may host several virtual machines (VMs). Because dedicated hardware allows for the running of just one operating system and application on each server, resource usage is significantly reduced. On the other hand, virtualization makes it possible to combine a number of separate virtual servers onto a single physical computer. This improves both the use of available resources and the overall efficiency of the system.

Because of this increased resource usage, there are cost savings, a decreased physical footprint, and greater scalability. This is because virtual machines can be provided and de-provisioned dynamically depending on the needs of the workload. Additionally, it helps to improve energy efficiency by reducing the number of physical servers required to do the same amount of computing work as before.


19. The boss at your company wants a way to block certain websites from employees. As the sole IT professional at the company, what can you set up to help with this request?

Answers

·        A Proxy server

·        DNS

·        FTP

·        An Intranet

Explanation: Before beginning the implementation of any solution, it is critical to verify that the web filtering rules have been effectively communicated to workers and that the solution that has been selected is compliant with both the company's policies and the legal requirements. Additionally, you should think about establishing exceptions or a method for workers to seek access to certain websites in the event that there are valid business reasons for doing so.

 

20. As an IT systems administrator, what can you set up to make sure that your client machines and server times are in sync?

Answers

·        A proxy

·        An intranet

·        NTP

·        A: FTP


21. Which of the following file transfer protocols is the most secure?

Answers

·        NTP

·        TFTP

·        SFTP

·        FTP


22. You want to access the CLI (command line interface) of a Linux terminal at work from your Apple laptop at home. You have the proper client installed on your laptop. What needs to be installed on the remote Linux machine?

Answers

·        PuTTY

·        OpenSSH

·        WinRM

·        RDP

Explanation: If you want to access the command line interface (CLI) of a Linux terminal running on a remote computer from your Apple laptop, the remote Linux system has to have a Secure Shell (SSH) server installed and operating on it.

 

23. When you make a DNS query, where does your computer first check to find an IP address to name mapping?

Answers

·        ISP DNS servers

·        Your local machine

·        Top-level domains

·        Root servers

Explanation: When you send a query to the DNS (Domain Name System) to convert a domain name to an IP address, the first thing that your computer does is check the resolver cache for its local DNS. This cache remembers previous DNS lookups, and if the computer is able to locate the requested domain name and the IP address that corresponds to it in the cache, it will be able to utilize that information rather than having to do a new DNS query.

24. Which of the following is an advantage of using DHCP?

Answers

·        DHCP leases IP addresses, removing the need to manually assign addresses.

·        DHCP allows usage of static IP addresses

·        DHCP allows you to manually set IP addresses.

·        DHCP maps IP addresses to human readable URLs.

Explanation: Within a network, the process of assigning IP addresses is made more efficient with the use of DHCP's automation. DHCP automatically configures each device with a dynamic IP address upon connection to the network. This eliminates the need to manually configure each individual device with a static IP address.

 

25. A network technician sets up an internal DNS server for a local network. When the technician types in a URL, which is checked first?

Answers

·        External ISP DNS servers

·        The local host file

·        Local DNS servers

·        External public DNS servers

Explanation: When a network technician enters in a URL, the computer that the technician uses normally does the initial check in the local DNS resolver cache on that system. If the requested domain name and its related IP address are located in the local DNS resolver cache, the computer may utilize that information without having to do a new DNS query. This is because the cache contains recent DNS lookups.

Shuffle Q/A 1

26. Google’s GSuite (now called Google Workspace) is an example of which Cloud service?

Answers

·        Software as a Service (SaaS)

·        Directory as a Service (DaaS)

·        Infrastructure as a Service (IaaS)

·        Platform as a Service (PaaS)

Explanation: One example of software that is hosted in the cloud and provided as a service is Google Workspace, which was previously known as G Suite. Software as a Service is a subset of cloud computing services that refers to the delivery of application software over the internet on a pay-per-use or subscription basis. In the case of Google Workspace, it provides users with access to a suite of cloud-based productivity and collaboration tools. Some of these applications include Gmail, Google Drive, Google Docs, Google Sheets, and Google Slides.

As a Software as a Service (SaaS) offering, customers access and use these apps using a web browser, and Google hosts and maintains the software on their cloud infrastructure. customers access and use these applications. Because everything is handled and distributed from the cloud under this approach, there is no longer a need for users to install, administer, and update the software on their local computers.


27. Which of the following are cons that come from using a Cloud Service? Select all that apply.

Answers

·        A simplified user interface

·        The need to depend on a provider for service

·        Having to purchase expensive networking hardware

·        Recurring cost


28. Which of the following is a potential negative (con) of virtualization compared to using dedicated hardware?

Answers

·        Maintenance

·        Cost

·        Points of failure

·        Performance

Explanation: The virtualization process adds a layer of abstraction between the actual hardware and the operating systems that are running in the virtual environment. It's possible that this layer, also known as the hypervisor, may add some unnecessary complexity, which will have a minimal effect on speed. Even if virtualization technology has made tremendous strides in recent years, there is still a possibility of a marginal drop in raw performance when compared to that of operating directly on dedicated hardware.

29. A sysadmin wants to use preboot execution over a network. Which type of server will the sysadmin likely use to administer operating system installation files?

Answers

·        A DNS server

·        An FTP server

·        An SFTP server

·        A TFTP server

Explanation: If a system administrator wishes to install operating systems using Preboot Execution Environment (PXE) via a network, the administrator would most likely utilize a Trivial File Transfer Protocol (TFTP) server to manage the files used in the installation of the operating systems.

PXE is a network booting protocol that enables a computer to boot and load its operating system from a network server rather than from local storage. This eliminates the need for the machine to be connected to the same network as the server. In the context of PXE booting, a TFTP server is used to transport the required data to the client computer during the preboot phase. These files include the initial boot loader as well as installation files for the operating system.

The client computer starts the process by broadcasting a PXE boot request, and the PXE-enabled network interface card (NIC) on the client then gets answers from DHCP (Dynamic Host Configuration Protocol) and TFTP servers. This is the standard procedure. The client receives information on the setup of the network from the DHCP server. This information includes the IP address of the TFTP server as well as the location of the boot file.

After that, the TFTP server will provide the necessary boot files to the client so that it may begin the boot process. This makes it possible for system administrators to easily deploy or reinstall operating systems on many workstations across the network.

To summarize, a sysadmin will utilize a TFTP server to oversee the transfer of operating system installation files to client computers during the preboot execution phase of PXE booting. This will take place when the preboot execution phase is taking place.

 

30. PuTTY in Windows is similar to which Linux tool?

Answers

·        CLI

·        SSH

·        RDP

·        Virtualization

Explanation: OpenSSH, a utility used on Linux, has a Windows equivalent called PuTTY. PuTTY is a well-known terminal emulator and SSH client for Windows. It offers a graphical user interface for connecting to remote servers using several network protocols, including SSH, Telnet, and others. PuTTY is quite popular. Accessing and managing Linux servers from inside a Windows environment is made possible with the help of this tool.

On the other hand, OpenSSH is a collection of open-source technologies that may be used for safe remote logins, the transmission of files, and tunneling. It is the implementation of the SSH protocol that is considered to be the standard, and Linux and other operating systems that are similar to Unix utilize it extensively. OpenSSH comes with command-line tools such as ssh, which is used to connect to remote servers; scp, which is used to securely copy files; and sftp, which is used to securely transfer files.

Both PuTTY and OpenSSH are meant to provide secure remote access to servers; however, their implementations are distinct and they are optimized for use with a variety of operating systems. PuTTY and OpenSSH fulfill the same essential goal. While OpenSSH is a program that comes standard on Linux operating systems, PuTTY is designed to work only with Windows.

 

31. Which of the following are reasons for using DNS? Select all that apply.

Answers

·        It maps names humans can understand to IP addresses.

·        It maps local addresses to simple names without editing hosts files.

·        It lets users remotely operate computers from miles away.

·        It improves network throughput.


32. What does DHCP do?

Answers

·        DHCP sets up an authoritative DNS server a network.

·        DHCP assigns IP addresses to computers on a network.

·        DHCP maps domain names to IP addresses.

·        DHCP keeps the clock synchronized on machines connected to a network.

Explanation: DHCP, which stands for "Dynamic Host Configuration Protocol," is a network protocol that offers a method for dynamically assigning and controlling IP addresses and other network setup settings to devices on a network. DHCP is also known as "Dynamic Host Configuration Protocol."

 

33. You are the sole IT professional at your company and you need to know how many users or computers are in your organization. Which of the following services helps manage users in your company?

Answers

·        Physical infrastructure services

·        Platform services

·        Network services

·        Directory services

Explanation: Directory Services or Identity Management Services are normally what an IT expert would turn to in the event that the business needed user management assistance. These services provide a centralized management and organization system for user accounts, as well as authentication and authorization procedures. In a Windows-based operating system, the Active Directory service is one of the most typical instances of this kind of service.

Microsoft's Active Directory is a directory service that is often used to manage people, computers, and other resources in a network that is based on Windows. Active Directory was created by Microsoft.

 

34. Which of the following are typically included with server operating systems to help optimize server functionality? Select all that apply.

Answers

·        Allow more network connections

·        Added security

·        More RAM capacity

·        A simplified user interface


35. What is a type of tool a client could use to access a server and transfer files?

Answers

·        A DNS server

·        IaaS

·        An FTP Client

·        A server operating system

Explanation: An FTP (File transmit Protocol) client is a piece of software that enables a client to connect to a server and transmit files to and from the server.File move Protocol (FTP) is a common network protocol that is used to move files from one host to another across a TCP-based network like the internet. FTP stands for File Transfer Protocol. The term "FTP client" refers to a piece of software that gives users the ability to connect to an FTP server, explore the file system of the server, and transmit data back and forth between the client and the server.

 

36. You are setting up a website for your company. You have purchased a domain name for the site and have decided to host your web content yourself. What might you need to set up to point your new domain name to where web content is located?

Answers

·        An authoritative DNS server

·        A TFTP server

·        A VNC client

·        A proxy server


37. A website is inaccessible via its URL. You've pinged the site and see no problem there. What is the next troubleshooting step?

Answers

·        Ping localhost

·        Use nslookup in the terminal to rule out DNS issues

·        Turn the device off and on again

·        Access host file and check for inconsistencies

Shuffle Q/A 2

38. Which service gives access to pre-configured virtual machines that can be used like physical servers?

Answers

·        DaaS

·        IaaS

·        SaaS

·        PaaS


39. What happens when you virtualize a server?

Answers

·        It provides access to software maintained on the Cloud.

·        It provides remote access to other computers in another part of the world.

·        It puts many instances on a single physical server.

·        It keeps all the machines on a network synchronized.

Explanation: When you virtualize a server, you generate virtual instances of the operating system and programs that are installed on the server. This makes it possible for numerous virtual servers to coexist on a single physical server. Server virtualization is the term used to describe this procedure.

40. Which of the following best describes an intranet?

Answers

·        An intranet is a type of file transfer protocol.

·        An intranet is used to host a company’s internal websites and resources.

·        An intranet is a service that provides access to pre-configured virtual machines for a fee.

·        An intranet is a single server with many virtual instances on it.

Explanation: A private network that exists inside an organization and makes use of internet technology to enable its members to communicate more easily with one another, exchange information privately, and work together on projects is known as an intranet. It is a network with limited access that runs on the internal infrastructure of the business and is not available to the general public.

41. A network technician is unable to resolve a domain name. What is the first step the technician should take to troubleshoot the problem?

Answers

·        Verify that the DNS server is giving a correct address

·        Check that the network connection is working

·        Reconfigure the local host file

·        Restart the browser

Post a Comment

Previous Post Next Post