1. Which of the following are considered part of the physical infrastructure service? Check all that apply.
Answers
· Laptop
· Rack server
· Desktop
· Operating systems
2. Which of the following are considered a network service? Check all that apply.
Answers
· DNS
· Email server
· Blade server
· Wireless Internet
3. Amazon Web Services, Linode, Windows Azure, and Google Compute Engine are examples of ________.
Answers
· NaaS providers
· Shopping places
· Computer brands
· IaaS Providers
Explanation: Examples of cloud computing platforms or cloud service providers include Amazon Web Services, Linode, Google Compute Engine, and Microsoft Azure (previously Windows Azure). They provide Infrastructure as a Service (IaaS) and other cloud services, which enable customers to get access to and make use of computer resources, storage, and services via the internet without the need for real hardware or the administration of physical infrastructure.
4. Which of the following are considered a software service? Check all that apply.
Answers
· Wireless Internet
· Word processors
· Email applications
· Chat applications
5. What type of service is an all-in-one solution to building and deploying a web application?
Answers
· PaaS
· NaaS
· SaaS
· IaaS
Explanation: Platform as a Service (PaaS) is a term that is often used to refer to a solution that includes both the construction and deployment of a web application. PaaS gives users access to a platform that simplifies the process of application creation, deployment, and administration by providing the necessary software, services, and infrastructure. Without having to worry about the underlying infrastructure, developers are free to concentrate on creating code and adding features while using a platform as a service (PaaS).
Heroku, Google App Engine, and Microsoft Azure App Service are a few examples of providers that fall within the PaaS category. It is often simpler for developers to construct and deploy online applications when using these platforms since they provide a variety of services, such as web hosting, database administration, scalability capabilities, and development tools.
6. Which one of the following operating systems would be best suited for running a server?
Answers
· Ubuntu Server
· MacOS
· Windows 10
· Ubuntu
Explanation: There are many different operating systems that are capable of running servers, and the selection of one should be based on a number of considerations, including the particular use cases, personal preferences, and level of technical skill. Linux distributions, in particular those belonging to the Debian/Ubuntu and CentOS/RHEL families, are often used in server settings. You may be thinking about making use of one or more of these possibilities.
7. Which of the following are benefits of virtualizing servers? Check all that apply.
Answers
· Easier maintenance.
· Low RAM memory requirement.
· Better performance than a dedicated server.
· Better hardware resource utilization.
8. Which of the following are ways that can be used to run services?
Answers
· Virtualized instance on a server.
· Dedicated hardware
· VPN
· SSH
9. Which of the following is needed in order to use SSH to connect to a machine? Check all that apply.
Answers
· A VPN connection.
· An SSH server on the machine you want to connect to.
· A virtual server to connect to.
· An SSH client on the machine from which the connection begins.
10. Which of the following are samples of remote access tools? Select all that apply.
Answers
· RAM
· RDP
· OpenSSH
· WinRM
11. What is one benefit of using TFTP over SFTP?
Answers
· Added security
· Simpler transfer without authentication
· The encrypted transfer of data
· The user authentication requirement
Explanation: However, it is essential to keep in mind that although TFTP has certain benefits in terms of its ease of use, it does not have the security protections that are offered by SFTP. Since TFTP does not include any encryption, authentication, or other security procedures, using it for the transmission of safe and sensitive data is not the best idea. SFTP, on the other hand, offers an alternative that is more secure because to its capabilities in the areas of encryption and authentication. Which protocol, TFTP or SFTP, should be used to transfer files depends on the particular needs of the use case as well as any relevant security concerns.
12. What service can you use to keep time synchronized across the machines on your fleet?
Answers
· FTP
· Kerberos
· NTP
· SFTP
Explanation: You may use the Network Time Protocol (NTP) service to maintain the time on all of the computers in a fleet synced with one another. NTP is a protocol that was developed to synchronize the time on all of the computers that are connected to a network. It makes it possible for machines to keep precise and consistent time, which is essential for a wide variety of applications and services that depend on synchronized time.
13. What features does a proxy offer? Check all that apply.
Answers
· Network privacy
· Network traffic monitoring
· Internet traffic filtering
· The ability for employees to share information more easily
14. The ability for employees to share information more easily
Answers
· DHCP
· DNS
· NTP
· SFTP
15. If you don't want to use static IP addresses, but want to dynamically assign IP addresses to computers instead, what network protocol can you use?
Answers
· TFTP
· Kerberos
· NTP
· DHCP
Explanation: You may utilize the Dynamic Host Configuration Protocol (DHCP) if you wish to dynamically assign IP addresses to computers rather than using static IP addresses. This can be done by avoiding using static IP addresses. A network protocol known as DHCP is responsible for the automated assignment of IP addresses and other information on the setup of a network to devices that are connected to that protocol.
This kind of dynamic IP address assignment makes it possible to have a more flexible and automated administration of IP addresses inside a network, which in turn reduces the need for any human setup. In order to streamline the procedure of joining devices to a network, DHCP is a protocol that is often used in private as well as public network.
16. Which of these is an advantage of using Infrastructure as a Service (or IaaS) solutions?
Answers
· It lets users access software online without having to install it on individual systems.
· It provides the resources users need without maintaining any actual hardware.
· The user can keep files on a local network.
· It centralizes the organization’s users and computers in one location, and the organization can add, update, or remove users and computers.
Answers
· SaaS (Software as a Service)
· PaaS (Platform as a Service)
· DaaS (Directory as a Service)
· IaaS (Infrastructure as a Service)
Answers
· User experience
· Maintenance
· Security
· Performance
Because of this increased resource usage, there are cost savings, a decreased physical footprint, and greater scalability. This is because virtual machines can be provided and de-provisioned dynamically depending on the needs of the workload. Additionally, it helps to improve energy efficiency by reducing the number of physical servers required to do the same amount of computing work as before.
Answers
· A Proxy server
· DNS
· FTP
· An Intranet
Answers
· A proxy
· An intranet
· NTP
· A: FTP
Answers
· NTP
· TFTP
· SFTP
· FTP
Answers
· PuTTY
· OpenSSH
· WinRM
· RDP
Answers
· ISP DNS servers
· Your local machine
· Top-level domains
· Root servers
24. Which of the following is an advantage of using DHCP?
Answers
· DHCP leases IP addresses, removing the need to manually assign addresses.
· DHCP allows usage of static IP addresses
· DHCP allows you to manually set IP addresses.
· DHCP maps IP addresses to human readable URLs.
Answers
· External ISP DNS servers
· The local host file
· Local DNS servers
· External public DNS servers
Shuffle Q/A 1
26. Google’s GSuite (now called Google Workspace) is an example of which Cloud service?
Answers
· Software as a Service (SaaS)
· Directory as a Service (DaaS)
· Infrastructure as a Service (IaaS)
· Platform as a Service (PaaS)
As a Software as a Service (SaaS) offering, customers access and use these apps using a web browser, and Google hosts and maintains the software on their cloud infrastructure. customers access and use these applications. Because everything is handled and distributed from the cloud under this approach, there is no longer a need for users to install, administer, and update the software on their local computers.
Answers
· A simplified user interface
· The need to depend on a provider for service
· Having to purchase expensive networking hardware
· Recurring cost
28. Which of the following is a potential negative (con) of virtualization compared to using dedicated hardware?
Answers
· Maintenance
· Cost
· Points of failure
· Performance
29. A sysadmin wants to use preboot execution over a network. Which type of server will the sysadmin likely use to administer operating system installation files?
Answers
· A DNS server
· An FTP server
· An SFTP server
· A TFTP server
PXE is a network booting protocol that enables a computer to boot and load its operating system from a network server rather than from local storage. This eliminates the need for the machine to be connected to the same network as the server. In the context of PXE booting, a TFTP server is used to transport the required data to the client computer during the preboot phase. These files include the initial boot loader as well as installation files for the operating system.
The client computer starts the process by broadcasting a PXE boot request, and the PXE-enabled network interface card (NIC) on the client then gets answers from DHCP (Dynamic Host Configuration Protocol) and TFTP servers. This is the standard procedure. The client receives information on the setup of the network from the DHCP server. This information includes the IP address of the TFTP server as well as the location of the boot file.
After that, the TFTP server will provide the necessary boot files to the client so that it may begin the boot process. This makes it possible for system administrators to easily deploy or reinstall operating systems on many workstations across the network.
To summarize, a sysadmin will utilize a TFTP server to oversee the transfer of operating system installation files to client computers during the preboot execution phase of PXE booting. This will take place when the preboot execution phase is taking place.
30. PuTTY in Windows is similar to which Linux tool?
Answers
· CLI
· SSH
· RDP
· Virtualization
On the other hand, OpenSSH is a collection of open-source technologies that may be used for safe remote logins, the transmission of files, and tunneling. It is the implementation of the SSH protocol that is considered to be the standard, and Linux and other operating systems that are similar to Unix utilize it extensively. OpenSSH comes with command-line tools such as ssh, which is used to connect to remote servers; scp, which is used to securely copy files; and sftp, which is used to securely transfer files.
Both PuTTY and OpenSSH are meant to provide secure remote access to servers; however, their implementations are distinct and they are optimized for use with a variety of operating systems. PuTTY and OpenSSH fulfill the same essential goal. While OpenSSH is a program that comes standard on Linux operating systems, PuTTY is designed to work only with Windows.
Answers
· It maps names humans can understand to IP addresses.
· It maps local addresses to simple names without editing hosts files.
· It lets users remotely operate computers from miles away.
· It improves network throughput.
Answers
· DHCP sets up an authoritative DNS server a network.
· DHCP assigns IP addresses to computers on a network.
· DHCP maps domain names to IP addresses.
· DHCP keeps the clock synchronized on machines connected to a network.
Answers
· Physical infrastructure services
· Platform services
· Network services
· Directory services
Microsoft's Active Directory is a directory service that is often used to manage people, computers, and other resources in a network that is based on Windows. Active Directory was created by Microsoft.
Answers
· Allow more network connections
· Added security
· More RAM capacity
· A simplified user interface
Answers
· A DNS server
· IaaS
· An FTP Client
· A server operating system
Answers
· An authoritative DNS server
· A TFTP server
· A VNC client
· A proxy server
Answers
· Ping localhost
· Use nslookup in the terminal to rule out DNS issues
· Turn the device off and on again
· Access host file and check for inconsistencies
38. Which service gives access to pre-configured virtual machines that can be used like physical servers?
Answers
· DaaS
· IaaS
· SaaS
· PaaS
Answers
· It provides access to software maintained on the Cloud.
· It provides remote access to other computers in another part of the world.
· It puts many instances on a single physical server.
· It keeps all the machines on a network synchronized.
Explanation: When you virtualize a server, you generate virtual instances of the operating system and programs that are installed on the server. This makes it possible for numerous virtual servers to coexist on a single physical server. Server virtualization is the term used to describe this procedure.
40. Which of the following best describes an intranet?
Answers
· An intranet is a type of file transfer protocol.
· An intranet is used to host a company’s internal websites and resources.
· An intranet is a service that provides access to pre-configured virtual machines for a fee.
· An intranet is a single server with many virtual instances on it.
Explanation: A private network that exists inside an organization and makes use of internet technology to enable its members to communicate more easily with one another, exchange information privately, and work together on projects is known as an intranet. It is a network with limited access that runs on the internal infrastructure of the business and is not available to the general public.
41. A network technician is unable to resolve a domain name. What is the first step the technician should take to troubleshoot the problem?
Answers
· Verify that the DNS server is giving a correct address
· Check that the network connection is working
· Reconfigure the local host file
· Restart the browser