Week 6 – Operating Systems in Practice

1. Which portion of the PuTTY package allows you to perform file transfers using the Secure Copy protocol?

Answers

·        Pscp.exe

·        Pageant.exe – Not quite. The pageant tool is used by PuTTY to perform SSH authentication — not to perform data copies between computers.

·        Psftp.exe

·        Mstsc.exe

Explanation: PSCP, which stands for "PuTTY Secure Copy," is the name of the component of PuTTY that handles file transfers and is responsible for the application of the Secure Copy (SCP) protocol. It is a command-line program that is included with the PuTTY package and is used for the purpose of transferring data between computers across a network in a safe manner.

2. What is a protocol implemented by other programs for secure computer-to-computer access?

Answers

·        Remote connection

·        SSH

·        SCP

·        PuTTY

Explanation: For safe access from one computer to another, there are a few different protocols that may be implemented by other applications. SSH (also known as Secure Shell) is a well-known example of a program that offers secured communication over a network. It offers a variety of authentication mechanisms to provide a secure connection and enables for the provision of secure access to a distant computer system. One such protocol is known as SFTP, which stands for the Secure File transmission Protocol. This protocol, which is an extension of SSH, allows for the safe transmission of data between computers.

Within the field of computer networking, these protocols see widespread use for the purposes of remote administration, secure file transfers, and other secure communication requirements.

3. Which of these gives users a graphical user interface (GUI) to remote computers that have enabled connections from it.

Answers

·        Pscp.exe

·        PuTTY

·        RDP

·        SCP

Explanation: SSH (Secure Shell) with X11 forwarding is a standard technology used for connecting to distant computers while providing a graphical user interface (GUI). Through the use of X11 forwarding, it is possible to display locally the graphical desktop environment of a distant computer. You are able to execute graphical apps on the distant computer when you connect to it using SSH with X11 forwarding. These applications' graphical user interfaces will be presented on your local system.

Before you can make an SSH connection using PuTTY, you will need to make sure that the "Enable X11 forwarding" option in the PuTTY setup is checked. This is necessary in order to allow X11 forwarding. This gives you the ability to interact with the graphical apps that are running on the distant system as if they were running on your local workstation.

4. Which of the following is a Linux command used to copy files securely between computers on a network?

Answers

·        SSH

·        RDP

·        PuTTY

·        SCP

Explanation: scp, which stands for "Secure Copy," is the Linux command that is often used to safely transfer data from one computer on a network to another. It ensures that files are sent safely by using the Secure Shell (SSH) protocol.

5. What can you use to give access to files to a group of users as an alternative to transferring files from one computer to another?

Answers

·        A shared folder

·        Mstsc.exe

·        A remote connection

·        SSH

Explanation: Utilizing networked file systems and methods for file sharing is a viable alternative to the traditional method of moving data from one computer to another. Depending on the operating systems that are being used, a share may either be created using a Network File System (NFS) or a Server Message Block (SMB), which is a frequent way.

6. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

Answers

·        Application and Services

·        Security

·        System

Explanation: It is quite probable that you will want to begin your inquiry by looking into the "Security" logs that are located in the Event Viewer of a Windows PC. The Security logs in the Event Viewer capture events that pertain to user authentication, logins, and other operations associated with the maintenance of system security.

7. In what log files can you find information about bootup errors? Select all that apply.

Answers

·        /var/log/auth.log

·        /var/log/mail.log

·        /var/log/kern.log

·        /var/log/syslog

8. In what log files can you find information about authentication errors?

Answers

·        /var/log/auth.log

·        /var/log/kern.log

·        /var/log/syslog

·        /var/log/mail.log

9. For an ssh connection to work, which of the following need to be true? Check all that apply.

Answers

·        SSH is installed on client.

·        The SSH server is running on the host you want to connect to.

·        VPN needs to be set up.

·        You need to specify a hostname to SSH into.

10. What command do you use to view error logs in real time?

Answers

·        Less var/log/syslog

·        /var/log/auth.log

·        -kill

·        Tail -f

Explanation: On a computer operating system that is similar to Unix, such as Linux, you may use the tail command in conjunction with the -f (follow) option to see error logs in real time. Because it enables you to keep track, in real time, of the lines that are being added to a file using the append command, the tail -f tool is particularly handy for monitoring logs.

11. Which of the following can be used to connect securely to a remote computer? (Choose all that apply)

Answers

·        An SSH client

·        A VPN connection

·        An SSD client

·        A dynamic-link library


12. What happens when you type the following command in the Powershell command line: putty.exe -ssh alex-chi@104.131.122.215 22?

Answers

·        You will establish a chat connection with someone called “auser”

·        You will establish a chat connection with someone called “auser”

·        Your computer connects to an SSH located at IP address 104.131.122.215

·        You will search for a user called “alex-chi” logged into your local area network

Explanation: In PowerShell, the command that you gave tries to launch PuTTY with the arguments -ssh alex-chi@104.131.122.215 22. Nevertheless, there is a minor syntactic problem in the command that you entered. To resolve this issue, you will need to launch the PuTTY executable by using the & operator.

 

13. Which of the following is the Windows command line tool that enables file sharing from the CLI?

Answers

·        share file

·        net share

·        file share

·        share to net

Explanation: The netsh tool is the command line utility for Windows that allows file sharing from the command line. The netsh command-line program is used for a variety of activities relating to networks, one of which is the configuration of file sharing settings.

14. What is Virtual Box?

Answers

·        A cloud-based file hosting service

·        A virtual machine

·        Software for managing virtual instances

·        A VPN network

Explanation: VM Oracle VirtualBox is the name of a free and open-source hosted hypervisor that is used for x86 virtualization. It is most generally referred to as VirtualBox. On a single physical system, you are able to operate many virtual machines (VMs), thanks to this feature. Oracle Corporation is the company that created VirtualBox, and it is compatible with a wide variety of guest operating systems. These guest operating systems include Windows, Linux, macOS, and others.

15. Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?

Answers

·        Maybe

·        No

·        Yes

Explanation: On a physical system that is running Windows, it is conceivable to run a virtual instance of Linux. This is definitely something that can be done. The usage of virtualization software, such as Oracle VM VirtualBox, VMware Workstation, or Microsoft Hyper-V, is required to accomplish this goal.

Once the virtual machine has been installed and is operational, it will be possible for you to run both Windows and Linux concurrently on the same physical system. This is very helpful for development, testing, learning, and any other situation in which you need to run numerous operating systems on a same machine. You may even use this to run different versions of the same operating system.

 

16. What Windows application stores events logged by the operating system?

Answers

·        LogOS View

·        Event Viewer

·        Powershell

·        SLogGUI

Explanation: The program in Windows that is responsible for seeing and managing the events that have been recorded by the operating system is referred to as the "Event Viewer." Users of a Windows computer have access to a built-in program known as the Event Viewer, which enables them to examine and investigate event logs.Event Viewer is responsible for the recording of a wide variety of events and logs, some of which include errors, warnings, informative events, and others. On a Windows computer, it is a very helpful tool for debugging problems, monitoring the health of the system, and examining events that are linked to security.

 

17. In Linux, which of the following log files usually contains the most comprehensive list of events?

Answers

·        The /var/log/kern.log file

·        The /var/log/uber.log file

·        The /var/log/dmesg file

·        The /var/log/syslog file

Explanation: The /var/log/syslog file in Linux is the log file that typically provides the most exhaustive record of events of any other file in the system. It is a central destination for system logs because the syslog file consolidates system messages and events from the many components and services on the system and stores them all in one place.

However, it is essential to keep in mind that the particular layout of log files might change depending on the Linux version you use. Some distributions make use of additional log files in addition to the /var/log/messages file for accomplishing the same goals.

 

18. Which of the following commands can be used to observe your syslog in real time?

Answers

·        tail -f /var/log/syslog

·        run -l /var/log/syslog

·        view -rt /var/log/syslog

·        rtview /var/log/syslog

Explanation: This command makes use of the tail utility to display the most recent few lines of the syslog file, after which it continues to show new lines as they are added to the file. In order to guarantee that you have the appropriate rights to access the syslog file, the sudo command is used.

Since the location of syslog files might differ depending on the distribution, feel free to alter the path to the syslog file as necessary. Alternately, the journalctl command could be used for accessing logs on certain systems, particularly if systemd is being used on such systems.

 

19. What is disk cloning used for? Select two that apply.

Answers

·        To image a computer system

·        To copy files from remote computers using the Secure Copy protocol (SCP)

·        To set up a remote desktop

·        To back up a machine


20. What is the difference between using SCP and other methods of file transfer?

Answers

·        SCP is less resource intensive than an email

·        SCP encrypts a flash drive for transfer

·        SCP uses SSH to transfer data

·        There is no difference

Shuffle Q/A 1


21. Which of the following programs is a popular SSH tool for Linux operating systems?

Answers

·        PuTTY

·        LinuxSSH

·        GoSSH

·        OpenSSH

Explanation: In conclusion, SCP stands out for its security features and interaction with SSH, which makes it a powerful alternative for secure file transfers, particularly in systems that are similar to Unix. It is possible to decide to utilize a different technique depending on the particular use cases and needs that are involved, taking into account aspects such as the simplicity of the method and its independence from the platform.

 

22. What does the PuTTY pscp.exe tool do?

Answers

·        It creates a virtual machine on your Windows desktop.

·        It creates a virtual private network.

·        It launches the Remote Desktop Protocol (RDP) client in Windows.

·        It lets you copy files to and from remote computers.


23. What is one benefit of using a virtual machine vs a physical one?

Answers

·        Virtual machines don’t require passwords

·        Multiple users can use one virtual machine

·        Virtual machines are free to use on the cloud

·        It’s very simple to change virtual hardware resource allocation

Explanation: When opposed to utilizing a physical system, using a virtual machine (VM) has a number of major advantages, one of the most notable of which is the capability to achieve greater resource efficiency via virtualization. The process is often referred to as server consolidation.

 

24. Alex is trying to start an Ubuntu virtual machine for the first time. They’ve already installed Virtual Box on their Windows computer, which of the following is a good next step?

Answers

·        Download the Ubuntu OS image

·        Restart the virtual instance

·        Download a Windows OS image

·        Add more physical RAM


25. You’ve found a log file with a long list of errors in it. Where in the log would be a good place to start searching for the problem?

Answers

·        The top

·        The middle

·        The bottom

Explanation: When you discover a log file that has a lengthy sequence of errors, the very last line of the log file is sometimes an excellent location to begin looking for the cause of the issue. Because errors are normally added to the log in the order in which they occur, the most recent entries may typically be located at the very bottom of the log.You will be able to concentrate on the most recent occurrences if you begin at the very end of the log file and work your way backwards. This will make it more likely that you will discover what is causing the problems. Additionally, this strategy is useful when dealing with real-time log monitoring or debugging current occurrences since it provides a more comprehensive view.

 

26. What remote connection tool is built into the command line after PuTTY is installed on a Windows computer?

Answers

·        PuTTYPwrShell

·        PuTTYcmd

·        Plink

·        Premote

Explanation: Plink.exe is the name of the remote connection utility that is incorporated into the command line of a Windows computer once PuTTY has been installed on that machine. Users are able to connect to distant systems and carry out tasks in a manner that is not interactive thanks to the plink.exe program, which serves as a command-line interface to the PuTTY back ends.

27. What is a virtual instance?

Answers

·        A program for creating virtual machines

·        A virtual machine that has been copied

·        A virtual machine that only runs in the CLI

·        A single virtual machine

Explanation: An emulation of a real computer that is carried out in software is referred to as a virtual instance, which is also abbreviated as a virtual machine (VM). It functions as a separate setting inside the larger host system, making it possible for numerous virtual instances to be active at the same time on the same piece of physical hardware. Each every virtual instance operates in the same manner as if it were a standalone computer, replete with its very own working environment, apps, and resources.

28. In Linux, what type of messages are stored in the /var/log/dmesg file?

Answers

·        Diagnostic messages

·        System messages

·        System startup messages

·        Direct messages

Explanation: The /var/log/dmesg file provides a historical record of events that are linked to the kernel, particularly those that take place during the startup process of the system. It is an invaluable resource for figuring out how to fix problems that are connected to the hardware and obtaining insights into how the system is configured. Because the information included in this file is gathered at a very early stage in the boot process, it may be a helpful instrument in the process of identifying issues that may have an effect on the general stability and operation of the system.

 

29. What is a benefit of cloning a hard drive versus installing from installation media?

Answers

·        A cloned drive is more secure

·        Cloned drives will last longer

·        Installing from installation media is more resource intensive

·        The cloned drive also includes settings and folders


30. When using the SCP command, what information will you need to complete the transfer? (Choose all that apply)

Answers

·        Source hostname

·        Destination IP address

·        Destination user

·        Source IP address


31. What does SSH stand for?

Answers

·        Secure Shell

·        Single Server Hold

·        Secure Service Handler

·        Solid State Handshake

Explanation: A protocol known as Secure Shell (SSH) is a way that allows users to transmit instructions to a computer across an unprotected network in a safe and secure manner. Cryptography is used by SSH in order to provide authentication and encrypt communications between devices.

 

32. Which of the following is needed to virtualize an instance of Ubuntu the first time? (Choose all that apply)

Answers

·        A physical host machine

·        Software for installing an OS image

·        An image of Ubuntu

·        A Windows host system

Shuffle Q/A 2


33. What Windows application stores events logged by the operating system?

Answers

·        Event Viewer

·        SLogGUI

·        LogOS View

·        Powershell

Explanation: The program in Windows that is responsible for seeing and managing the events that have been recorded by the operating system is referred to as the "Event Viewer." Users of a Windows system have access to a built-in administrative tool called the Event Viewer, which enables them to examine and investigate event logs on the system.

34. It is important that log are regularly cleaned out to make room for new ones. In Linux, what utility manages this?

Answers

·        logswap

·        cleanlog

·        logrotate

·        delnewlog

Explanation: "logrotate" is the name of the application that is used often in Linux for the management and rotation of log files, with the end goal of preventing these files from using an excessive amount of disk space. Logrotate is a system program that can automatically rotate log files, remove old log files, compress old log files, and send old log files.

35. What happens when you type the following command in the Linux command line: sudo dd if=/dev/sdd of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.

Answers

·        You will create an image file on your desktop

·        You will create a file called “100M.”

·        You will make a copy of all data located on an sdd device.

·        You will delete a file called “USBcopy.imge.”

36. What is the Microsoft Terminal Services Client used for?

Answers

·        Enabling terminal connections on a remote computer.

·        Locating terminals running on a computer.

·        Creating RDP connections to remote computers.

·        Connecting with Linux computers outside of the local network.

Explanation: The Microsoft Terminal Services Client is a software program that was created by Microsoft. It is also widely referred to as the Remote Desktop Connection (RDC) or the Remote Desktop Client (RDC). It allows users to view and interact with a remote desktop or server across a network. This may be done by connecting to the desktop or server remotely.

37. What is one reason you might avoid sharing a folder with everyone on your network in Windows?

Answers

·        It means your computer always needs to be on.

·        It’s resource intensive.

·        It removes anything you’ve already placed in the folder.

·        It’s not very secure.

Explanation: Sharing a folder with everyone on your network in Windows is a possible security risk, and doing so gives you no control over who on your network may view the things you share. For this reason, you should probably avoid doing so. When you share a folder with "Everyone," it indicates that every user on the network, including anonymous users and guest users, has the possibility of seeing the material that has been shared.

38. In the Windows Event viewer, what is the highest logging level for an event?

Answers

·        Top

·        Critical

·        Warning

·        High

Explanation: The "Critical" logging level for an event is the highest one that can be achieved in the Windows Event Viewer. The significance or gravity of an event may be determined based on its logging level, which is sometimes referred to as its event level or severity level. The levels are organized in a hierarchy, with the least severe being at the bottom and the most severe being at the top.

39. What event grouping can be used in the Windows Event Viewer to filter specific types of events?

Answers

·        Filter Views

·        Custom Views

·        Error View

·        Sorted Logs

Explanation: You may organize and filter various sorts of events in the Windows Event Viewer by using the "Event Logs" or "Custom Views" options. These options are based on criteria that you establish. The use of "Event Channels," on the other hand, is a popular method that may organize and filter events.

Event Channels are a method for classifying occurrences in accordance with the context in which they occurred. Events are often categorized into distinct channels, which makes it much simpler to find and evaluate events that are connected to one another. The use of Event Channels enables a more organized and structured view of the event data, which assists in grouping events coming from a variety of sources and applications.

40. You’re working on a computer, but the log doesn’t show any clear errors. Where in the log would be a good place to start searching for the problem?

Answers

·        The bottom

·        The top

·        The middle

Explanation: If the log doesn't display any obvious faults while you're working on a computer, the "System" log in the Windows Event Viewer is an excellent location to begin looking for the cause of the issue. It's usual practice to look for information concerning system-level problems in the "System" log, which logs a range of events generated by Windows system components, services, and drivers. This log is called the "System" log.

Post a Comment

Previous Post Next Post