暗記メーカー
ログイン
SAM41A
  • dulsetnet

  • 問題数 49 • 10/1/2024

    記憶度

    完璧

    7

    覚えた

    19

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    What is the primary role of a system administrator?

    To manage the operation of a multiuser computing environment

  • 2

    Which of the following is NOT a responsibility of a system administrator?

    Developing Websites

  • 3

    What is a key challenge in system administration education?

    Access to adequate resources

  • 4

    Which of the following is NOT a pillar of exceptional system design?

    Affordability

  • 5

    Which of the following best describes "scalability"?

    The ability of a system to handle increased demand

  • 6

    What is a major factor contributing to the cost of system administration education?

    Acquiring and maintaining up-to-date hardware and software

  • 7

    Which of the following refers to minimizing complexity while maintaining functionality?

    Simplicity

  • 8

    Why is continuous learning important for system administrators?

    To keep up with evolving technologies and emerging threats

  • 9

    What is the purpose of physical security in system administration?

    To protect hardware and data centers from unauthorized access

  • 10

    What is a primary reason system administrators are crucial to an organization?

    They ensure business continuity by maintaining critical systems

  • 11

    Which of the following best describes UNIX?

    A powerful multiuser operating system known for its portability and multitasking

  • 12

    Who are the key figures associated with the creation of UNIX?

    Ken Thompson and Dennis Ritchie

  • 13

    What are the core responsibilities of the UNIX kernel?

    Hardware control, process scheduling, and memory management

  • 14

    Which of the following is a primary difference between Linux and Windows operating systems?

    Windows integrates the GUI with the kernel, while Linux allows the kernel to function independently from the GUI

  • 15

    What is a major characteristic of proprietary UNIX versions?

    They are controlled by specific companies and have usage restrictions

  • 16

    What is a key benefit of UNIX in terms of application availability?

    UNIX offers a large number of both commercial and free applications

  • 17

    What role does the UNIX shell play?

    It allows users to interact with the system through typed commands

  • 18

    Which of the following is true about the file systems used by Linux/UNIX?

    Linux/UNIX uses ext2, ext3, or ext4 file systems with a unified hierarchy starting from the root directory /

  • 19

    What is the primary purpose of system documentation for system administrators?

    To provide step-by-step instructions and technical information

  • 20

    When documenting for non-technical users, what is the most important aspect to consider?

    Simplifying the language and focusing on usability

  • 21

    Which of the following is a key characteristic of online documentation?

    Being concise and searchable with short paragraphs

  • 22

    What type of documentation is designed to define standards for resource use?

    Policy Documentation

  • 23

    What is the recommended approach when writing documentation for technical people?

    Assuming familiarity with technical concepts and being specific about procedures

  • 24

    Which of the following is an example of process and procedure documentation?

    A step-by-step guide to creating a new user account in Linux

  • 25

    Why is consistency important in system documentation?

    It ensures readers can follow the format easily and enhances clarity

  • 26

    What is the role of diagrams and visual aids in system documentation?

    To explain complex tasks, architecture, or workflows visually

  • 27

    What is the main function of malware?

    To steal sensitive information, delete files, and install backdoors

  • 28

    Which of the following is a method to prevent unauthorized access?

    Strong access controls like passwords and multi-factor authentication (MFA)

  • 29

    What is the goal of a Denial of Service (DoS) attack?

    To overwhelm system resources, making the system slow or unresponsive

  • 30

    What is the principle of least privilege?

    Only granting users the minimum permissions necessary to perform their tasks

  • 31

    Why are OS patches important?

    They fix known security vulnerabilities and bugs

  • 32

    Which of the following is an example of a strong access control method?

    Sandboxing untrusted programs

  • 33

    What is the purpose of logging and monitoring in an OS?

    To detect suspicious activity and address it quickly

  • 34

    What does the term 'Defense-in-Depth' mean in OS security?

    Implementing multiple security layers like hardening, access controls, and monitoring

  • 35

    What is an example of Direct Attached Storage (DAS)?

    External USB drive connected to a laptop

  • 36

    Which of the following best describes Network Attached Storage (NAS)?

    A storage device connected to a network, accessible by multiple devices

  • 37

    Which type of storage system is typically used in large organizations for high-speed access to storage devices?

    SAN

  • 38

    What is a primary advantage of cloud storage?

    Allows data access from any location with internet

  • 39

    Which storage interface supports hot-swapping, meaning you can replace a drive without shutting down the system?

    SATA

  • 40

    What is the primary function of Logical Volume Manager (LVM)?

    To combine multiple physical drives into one logical drive

  • 41

    Which file system is commonly used on Linux operating systems?

    ext4

  • 42

    In the Unix File System Layout, what is the role of Inodes?

    Store metadata and information about files

  • 43

    What is the primary purpose of RAID?

    To provide data redundancy and improve performance

  • 44

    What is a key feature of RAID 0?

    Striping without redundancy

  • 45

    Which RAID level combines both mirroring and striping?

    RAID 10

  • 46

    In RAID 1, what happens when a disk fails?

    The data is recovered from the mirrored disk

  • 47

    What is the main disadvantage of RAID 5?

    Long rebuild times after disk failure

  • 48

    Which of the following best describes striping?

    Dividing data into small blocks and spreading it across multiple disks

  • 49

    What does a RAID controller do in a hardware RAID configuration?

    Manages the RAID array independently of the operating system