暗記メーカー
ログイン
ITPC25
  • David Mirano

  • 問題数 77 • 8/21/2024

    記憶度

    完璧

    11

    覚えた

    29

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    The configuration and management of the hardware, software and operating systems also known as our infrastructure used to support users and devices and the applications they rely on to do their job.

    SYSTEMS ADMINSTRATION

  • 2

    is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.

    SYSTEM ADMINISTRATOR

  • 3

    These guys and gals are responsible for the organization’s network infrastructure which consists of routers and switches and the traffic flowing through them.

    NETWORK ADMINISTRATOR

  • 4

    These folks are responsible for maintaining web servers. Web server is a fancy term for a server, a machine in our data center that hosts websites and web services. They are also responsible for exposing those websites and web services externally to the internet as well as to our internal users.These folks are responsible for maintaining web servers. Web server is a fancy term for a server, a machine in our data center that hosts websites and web services. They are also responsible for exposing those websites and web services externally to the internet as well as to our internal users.

    WEB ADMINISTRATOR

  • 5

    These folks are responsible for securing the organization’s systems and networks. They are also responsible for firewalls. Both hardware firewall living in the inside and outside the network, as well as software firewalls living on the machines. You may think of them as traffic police. Or mall police. Only instead of sitting in malls, they sit on the organization’s networkThese folks are responsible for securing the organization’s systems and networks. They are also responsible for firewalls. Both hardware firewall living in the inside and outside the network, as well as software firewalls living on the machines. You may think of them as traffic police. Or mall police. Only instead of sitting in malls, they sit on the organization’s network

    SECURITY ADMINISTRATOR

  • 6

    They are the ones responsible for the organization’s database servers. And the database is living on those servers. Databases are used by applications to read and write data. So these folks are responsible for ensuring efficiency and integrity of that data.They are the ones responsible for the organization’s database servers. And the database is living on those servers. Databases are used by applications to read and write data. So these folks are responsible for ensuring efficiency and integrity of that data.

    DATABASE ADMINISTRATOR

  • 7

    These people are special. And here’s why. All previously discussed roles and other roles not mentioned such as developers, standard users and power users, they all need to go through the system administrator usually to request permissions via their user accounts to perform their configuration and everyday duties. And just to access the system in general.

    SYSTEM ADMINISTRATOR

  • 8

    consists of a single exam and covers configuration, management and troubleshoot of wired and wireless network devices.

    CompTIA Network+

  • 9

    covers server architecture, storage, networking and troubleshooting plus disaster recovery.

    CompTIA Server+

  • 10

    Covers common task in all the major distributions of Linux.

    CompTIA Linux+

  • 11

    . If you pass ANY Microsoft Exam, you’re an MCP.

    MICROSOFT CERTIFIED PROFESSIONAL

  • 12

    Exams that are vendor specific version of CompTIA+ and CompTIA Network+. They are foundation for whatever role or field in IT you want to get in to.

    MICROSOFT TECHNOLOGY ASSOCIATE

  • 13

    By far the most popular, most desired certification by employers. These are role-based certifications. There is an MCSA for productivity/office. There is an MCSA for Mobility, for Cloud, for infrastructure. And on the Systems Administrations side. It Actually consists of three (3) exams. One for compute, one for networking, and one for Active Directory.

    MICROSOFT CERTIFIED SOLUTIONS ASSOCIATE

  • 14

    – You just need to pass a single exam from a list of exams within a role. Those list of exams are known as electives and are usually very specific, focusing on a single technology. You pass one of those, you become an MCSE (for a year). You’d be given a fancy Microsoft Badge.

    MICROSOFT CERTIFIED SOLUTIONS EXPERT

  • 15

    This has nothing to do with Systems Administration as this targets developers building mobile, web and desktop applications.

    MICROSOFT CERTIFIED SOLUTIONS DEVELOPER

  • 16

    Consist of a single exam that covers awareness and knowledge of all the major Linux distribution like Debian, Ubuntu, Suse, CentOS, RedHat. And also a little bit about finding your way around the Linux System through basic command line operations.

    LINUX ESSENTIALS

  • 17

    This is basic Administration focused on installation and configuration of hardware and the Linux operating system. Packages and package management and a little bit deeper in the command line operations. And some scripting. This consists of 2 exams.

    LPIC-1 CERTIFIED ADMINISTRATOR

  • 18

    This covers the advance side of Systems Administration. This covers networking services like DNS, DHCP, SSE, Web Servers, File Servers etc. This consist of two (2) exams.

    LPIC-2 CERTIFIED ENGINEER

  • 19

    This is vendor specific (RedHat) certification exam for Linux

    REDHAT CERTIFIED SYSTEM ADMINISTRATOR

  • 20

    There are many types of servers in a data center. Rack servers, Tower servers, Blade servers. All these different types of enclosures that houses a server that provides, power, cooling, and a much more efficient usage of space.

    SERVERS

  • 21

    to provide network services to its users, to software and applications and to other servers within its environment.

    SERVER

  • 22

    The most popular type of server that you’ll find in every environment and oftentimes multiples in every environment is the blank This type of server is used to store content for everybody. Users store their files.

    FILE SERVER

  • 23

    Which is used to exposed websites externally to the Internet and internally to the organization’s users on the intranet (internal or company network).

    WEB SERVER

  • 24

    Which is primarily used by websites and applications to read and write data into a structured database. This is different from a file server which stores unstructured data.

    DATABASE SERVER

  • 25

    are used to host the middle-tier components of an application. So the front-end of your application which is a website or the application running on the desktop.

    APPLICATION SERVER

  • 26

    are used to expose printers to the network so everyone can use them. And it also gives the ability to centrally manage the printers, the drivers associated with them and the print jobs that are running on them.

    PRINT SERVER

  • 27

    are used to store process and deliver emails.

    MAIL SERVER

  • 28

    are used to cut down the amount of hardware in the data center. One Server can host many servers and operating systems

    VIRTUALIZATION SERVER

  • 29

    Another very important piece of hardware that Systems Administrator is responsible for are

    STORAGE DEVICE

  • 30

    have been around forever since the 1950s so they are ancient technology. Sixty plus years and still, widely used today. They are also referred to as magnetic or mechanical disk. And that is because they used magnetism to store data on a rotating platter. They are big and slow compared to SSDs. But their major advantage is that they can store large amount of data cheaply.

    HARD DISK DRIVES

  • 31

    Use flash storage that contains no moving parts whatsoever as data is stored on a microchip in the drive.

    SOLID STATE DRIVES

  • 32

    Is a low-cost, low maintenance solution, where a storage subsystem is either a part of or, directly attached to, the servers. This could be anything from a stack of HDDs and SSDs inside of the machine or in its own enclosure externally connected to the machine. It is great for small businesses that do not have the I.T. staff or the budget to handle the more complex storage solutions.

    DIRECT-ATTACHED STORAGE

  • 33

    When the storage sub-system moves to the network itself and connected directly to the network switch.

    NAS

  • 34

    NAS

    NETWORK-ATTACHED STORAGE

  • 35

    SAN

    STORAGE AREA NETWORK

  • 36

    gives us the best of both worlds. The performance of a DAS with the scalability of a NAS. In this architecture, the storage devices are still directly connected to a switch. But they are connected to a special high-speed switch known as a fiber channel switch. And that gives them their own high speed network known as a

    SAN

  • 37

    is a storage architecture that separates storage software from its hardware. Unlike traditional network-attached storage (NAS) or storage area network (SAN) systems, SDS is generally designed to perform on any industry-standard or x86 system, removing the software’s dependence on proprietary hardware. For example Microsoft has Storage Spaces (desktop) and Storage Spaces Direct (enterprise and data center) which is built into every version of Windows

    STORAGE DEFINED STORAGE

  • 38

    allows us to create a huge pool from our physical disks.

    STORAGE SPACES

  • 39

    There is a good amount of _____ between the Systems Administrator’s role and the Network Administrator’s role.

    CROSSOVER

  • 40

    is a traffic related networking device that allow us to extend the reach of our local network to support mobile devices.

    ACCESS POINT

  • 41

    monitor incoming and outgoing traffic. We configure security rules on these firewalls to allow or block specific kinds of traffic. In home networks, the firewall is usually built into the router.

    FIREWALLS

  • 42

    Its job is to provide automatic assignment of IP addresses and allows a System Administrator to centrally administer of IP addresses across all the devices on our network.Its job is to provide automatic assignment of IP addresses and allows a System Administrator to centrally administer of IP addresses across all the devices on our network.

    DHCP

  • 43

    is responsible for translating IP addresses to host names and host names into IP addresses.

    DNS

  • 44

    is a command line (or terminal) utility to test connectivity between machines on the local network and even out to the internet.

    PING

  • 45

    A ___ is what facilitates communication between a local network. All of our devices are connected to a switch and all that traffic goes through the switch to get to its destination from its source.

    SWITCH

  • 46

    are a lot like switches and they connect multiple networks together and have the ability to forward traffic outside of the local network.

    ROUTERS

  • 47

    are malicious actions or activities that target computer systems, networks, and data, with the intent to compromise their integrity, availability, or confidentiality.

    COMPUTER THREATS

  • 48

    a broad category of malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. Common forms of malware include viruses, worms, Trojans, spyware, and ransomware.

    MALWARE

  • 49

    are programs that attach themselves to legitimate files and replicate when those files are executed. They can spread from one computer to another through infected files or email attachments.

    VIRUSES

  • 50

    are self-replicating programs that can spread across networks and systems without any user intervention. They can consume network bandwidth and degrade system performance.

    WORMS

  • 51

    appear to be legitimate software but contain malicious code. They can create backdoors for hackers, steal sensitive data, or carry out other harmful actions.

    TROJANS

  • 52

    encrypts a user's files or entire system, making them inaccessible. Attackers demand a ransom from the victim to provide the decryption key.

    RANSOMWARE

  • 53

    is designed to secretly collect information about a user's activities, such as browsing habits, keystrokes, and login credentials. This information is then sent to third parties without the user's consent.

    SPYWARE

  • 54

    displays unwanted advertisements to users and often comes bundled with legitimate software. While not as malicious as other threats, it can be annoying and impact system performance.

    ADWARE

  • 55

    attacks involve tricking users into revealing sensitive information like passwords, credit card numbers, or personal data by posing as a trustworthy entity via email, websites, or other means.

    PHISHING

  • 56

    attacks manipulate individuals into revealing confidential information or performing actions that compromise security. These attacks often exploit human psychology rather than technical vulnerabilities.

    SOCIAL ENGINEERING

  • 57

    attacks overload a system or network to make it unavailable to users.

    DoS

  • 58

    attacks involve multiple compromised systems attacking a target simultaneously to overwhelm it.

    DDoS

  • 59

    These are attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or have not been patched.

    ZERO-DAY EXPLOITS

  • 60

    occur when individuals within an organization misuse their access to compromise systems, steal data, or engage in other malicious activities.

    INSIDER THREATS

  • 61

    are networks of compromised computers, known as "bots" or "zombies," controlled by a central entity. They are often used for activities such as spam distribution, DDoS attacks, or cryptocurrency mining.

    BOTNETS

  • 62

    are stealthy forms of malware that gain unauthorized access to a system and modify its operating system to hide their presence. They are difficult to detect and remove.

    ROOTKITS

  • 63

    These attacks occur when a user unintentionally downloads malicious software while visiting a compromised website or clicking on a deceptive link.

    DRIVE-BY DOWNLOADS

  • 64

    record a user's keystrokes on their keyboard, capturing sensitive data like passwords and credit card numbers. Cybercriminals can then use this information for fraudulent purposes.

    KEYLOGGERS

  • 65

    are hidden entry points into a system, allowing unauthorized access. They are often created by malware or malicious actors to maintain access to a compromised system.

    BACKDOORS

  • 66

    operates in memory and doesn't rely on traditional files or executables. This makes it harder to detect using traditional antivirus methods.

    FILELESS MALWARE

  • 67

    can change its code or appearance each time it infects a new system, making it difficult for antivirus programs to identify and remove.

    POLYMORPHIC MALWARE

  • 68

    involves writing scripts in the batch file format to automate tasks in Windows operating systems

    BATCH SCRIPTING

  • 69

    Adds a comment.

    REM

  • 70

    Turns off command echoing, useful for cleaner

    @echo off

  • 71

    Displays messages or turns on/off command echoing.

    ECHO

  • 72

    Pauses the script and displays "Press any key to continue...".

    pause

  • 73

    Prompts for confirmation before deleting each file.

    /P

  • 74

    Force deletes read-only files.

    /F

  • 75

    Deletes specified files from all subdirectories.

    /S

  • 76

    Quiet mode, does not ask for confirmation.

    /Q

  • 77

    Selects files to delete based on attributes.

    /A