問題一覧
1
What is the primary role of a system administrator?
To manage the operation of a multiuser computing environment
2
Which of the following is NOT a responsibility of a system administrator?
Developing Websites
3
What is a key challenge in system administration education?
Access to adequate resources
4
Which of the following is NOT a pillar of exceptional system design?
Affordability
5
Which of the following best describes "scalability"?
The ability of a system to handle increased demand
6
What is a major factor contributing to the cost of system administration education?
Acquiring and maintaining up-to-date hardware and software
7
Which of the following refers to minimizing complexity while maintaining functionality?
Simplicity
8
Why is continuous learning important for system administrators?
To keep up with evolving technologies and emerging threats
9
What is the purpose of physical security in system administration?
To protect hardware and data centers from unauthorized access
10
What is a primary reason system administrators are crucial to an organization?
They ensure business continuity by maintaining critical systems
11
Which of the following best describes UNIX?
A powerful multiuser operating system known for its portability and multitasking
12
Who are the key figures associated with the creation of UNIX?
Ken Thompson and Dennis Ritchie
13
What are the core responsibilities of the UNIX kernel?
Hardware control, process scheduling, and memory management
14
Which of the following is a primary difference between Linux and Windows operating systems?
Windows integrates the GUI with the kernel, while Linux allows the kernel to function independently from the GUI
15
What is a major characteristic of proprietary UNIX versions?
They are controlled by specific companies and have usage restrictions
16
What is a key benefit of UNIX in terms of application availability?
UNIX offers a large number of both commercial and free applications
17
What role does the UNIX shell play?
It allows users to interact with the system through typed commands
18
Which of the following is true about the file systems used by Linux/UNIX?
Linux/UNIX uses ext2, ext3, or ext4 file systems with a unified hierarchy starting from the root directory /
19
What is the primary purpose of system documentation for system administrators?
To provide step-by-step instructions and technical information
20
When documenting for non-technical users, what is the most important aspect to consider?
Simplifying the language and focusing on usability
21
Which of the following is a key characteristic of online documentation?
Being concise and searchable with short paragraphs
22
What type of documentation is designed to define standards for resource use?
Policy Documentation
23
What is the recommended approach when writing documentation for technical people?
Assuming familiarity with technical concepts and being specific about procedures
24
Which of the following is an example of process and procedure documentation?
A step-by-step guide to creating a new user account in Linux
25
Why is consistency important in system documentation?
It ensures readers can follow the format easily and enhances clarity
26
What is the role of diagrams and visual aids in system documentation?
To explain complex tasks, architecture, or workflows visually
27
What is the main function of malware?
To steal sensitive information, delete files, and install backdoors
28
Which of the following is a method to prevent unauthorized access?
Strong access controls like passwords and multi-factor authentication (MFA)
29
What is the goal of a Denial of Service (DoS) attack?
To overwhelm system resources, making the system slow or unresponsive
30
What is the principle of least privilege?
Only granting users the minimum permissions necessary to perform their tasks
31
Why are OS patches important?
They fix known security vulnerabilities and bugs
32
Which of the following is an example of a strong access control method?
Sandboxing untrusted programs
33
What is the purpose of logging and monitoring in an OS?
To detect suspicious activity and address it quickly
34
What does the term 'Defense-in-Depth' mean in OS security?
Implementing multiple security layers like hardening, access controls, and monitoring
35
What is an example of Direct Attached Storage (DAS)?
External USB drive connected to a laptop
36
Which of the following best describes Network Attached Storage (NAS)?
A storage device connected to a network, accessible by multiple devices
37
Which type of storage system is typically used in large organizations for high-speed access to storage devices?
SAN
38
What is a primary advantage of cloud storage?
Allows data access from any location with internet
39
Which storage interface supports hot-swapping, meaning you can replace a drive without shutting down the system?
SATA
40
What is the primary function of Logical Volume Manager (LVM)?
To combine multiple physical drives into one logical drive
41
Which file system is commonly used on Linux operating systems?
ext4
42
In the Unix File System Layout, what is the role of Inodes?
Store metadata and information about files
43
What is the primary purpose of RAID?
To provide data redundancy and improve performance
44
What is a key feature of RAID 0?
Striping without redundancy
45
Which RAID level combines both mirroring and striping?
RAID 10
46
In RAID 1, what happens when a disk fails?
The data is recovered from the mirrored disk
47
What is the main disadvantage of RAID 5?
Long rebuild times after disk failure
48
Which of the following best describes striping?
Dividing data into small blocks and spreading it across multiple disks
49
What does a RAID controller do in a hardware RAID configuration?
Manages the RAID array independently of the operating system