Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIT 315 Test Bank Network management, Exams of Computer Networks

CIT 315 Test Bank Network management

Typology: Exams

2024/2025

Available from 07/10/2025

Grace_Alesy
Grace_Alesy 🇺🇸

22 documents

1 / 153

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Chapter 1: Introduction to the Linux Operating System Key
1. All Linux versions are open source. TRUE
2. Everything Linux does is considered a process. TRUE
3. RAM is considered non-volatile storage. FALSE
4. A Linux CD/DVD-ROM drive is represented as a file. TRUE
5. The nature of open-source software discourages discovering and reporting security
vulnerabilities. FALSE
6. The main characteristic of ____ is that its source code is published with the software.
A. shareware
B. freeware
C. closed source software
D. open source software
7. Windows is an example of ____.
A. shareware
B. freeware
C. closed source software
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download CIT 315 Test Bank Network management and more Exams Computer Networks in PDF only on Docsity!

Chapter 1: Introduction to the Linux Operating System Key

  1. All Linux versions are open source. TRUE
  2. Everything Linux does is considered a process. TRUE
  3. RAM is considered non-volatile storage. FALSE
  4. A Linux CD/DVD-ROM drive is represented as a file. TRUE
  5. The nature of open-source software discourages discovering and reporting security vulnerabilities. FALSE
  6. The main characteristic of ____ is that its source code is published with the software. A. shareware B. freeware C. closed source software D. open source software
  7. Windows is an example of ____. A. shareware B. freeware C. closed source software

D. open source software

  1. Which software type allows users to have access to it for a limited time before it expires? A. Shareware B. Freeware C. Open-source D. General Public License
  2. Who developed Linux? A. Dennis Ritchie B. Linus Torvalds C. Andrew Tannenbaum D. Ken Thompson
  3. Each hardware device must have its own ____ so that the operating system can detect it. A. name B. process C. driver

C. shareware D. desktop

  1. Which two major resources does the Linux kernel manage? A. Processes and memory B. Processes and applications C. Files and applications D. Users and tasks
  2. Which term describes the storage space where a computer reads and writes data? A. Non-volatile memory B. Static memory C. ROM D. RAM
  3. Which type of paging makes it possible to load only needed sections of a program into RAM? A. Direct B. Demand C. Distinct D. Deamon
  1. The K Desktop Environment is written in the ____ programming language. A. C++ B. C C. Java D. GPL
  2. The highest point in the Linux file structure is the ____. A. top B. peak C. root D. base
  3. The highest point in the Linux files structure is indicated with the ____ symbol. A. dollar sign ($) B. asterisk (*) C. backward slash () D. forward slash (/)
  4. Which file type contains data such as text files or executable files?

A. HTTP

B. FTP

C. UDP

D. TCP/IP

  1. The number of commands remembered varies from shell to shell, but the default is ____. A. 10 B. 100 C. 1, D. 10,
  2. Which executable filename is used for the Bourne shell? A. bash B. ksh C. csh D. sh
  1. Which directory contains all Linux command shells? A. /dir B. /lsh C. /bin D. /dev
  2. A program is ____________________ when it is distributed with its source code so that users can view or modify it. open-source or open source
  3. ____________________ code is simply the instructions defining how a program works. Source
  4. At the core of an operating system is the ____________________, which performs the most basic computing functions. kernel
  5. For people to communicate or interact with machines, they need a user ____________________. interface
  6. The ____________________ feature enables multiple users to log on to a single computer at the same time. multiuser
  7. Match each item with a statement below.
  1. Describe a system service. Every time you run an application, the OS starts a process called a “system service” to handle it. The process runs in the background and carries out application-related tasks. Some system services start automatically when a computer is booted, such as the Network Service in Linux, which handles all network interfaces.
  2. Identify the main idea behind the General Public License (GPL) and list three characteristics of software developed under the GPL. The main idea behind the GPL stems from Richard Stallman’s philosophy that software should be free, by which he meant having the freedom to change the source code. The GPL states the following: · You can use, view, and change the source code. · You are able to redistribute the software and sell it for profit. · If you decide to sell the software, you must make the source code available.
  3. Provide a brief overview of SUSE. SUSE was developed in Germany in 1992 by Hubert Mantel, Burchard Steinbild, Roland Dyroff, and Thomas Fehr. The name “SUSE” is an acronym for “Software und System Entwicklung” (Software and System Development). It became a top Linux seller in Europe and was eventually sold to Novell for $ million. Novell is a multinational software and services corporation that provides support to more than 50,000 companies in 43 countries.
  4. Define the Linux modular architecture and discuss its advantages. Linux is a modular system, which means all its components are separate from one another. This design makes it possible for different teams to develop components that don’t affect one another. For instance, one team might update the kernel, and another team might create applications. In fact, you can create applications that meet your own needs or even contribute to the Linux kernel. A Linux distribution, such as openSUSE 11.2, consists of all the Linux components put together and released as one OS.
  1. Describe an advantage of having a multiuser system. One advantage of having a multiuser system is eliminating the need to back up multiple computers. If all data and applications are on a server, for instance, the computer staff needs to secure and back up only that system.
  2. Describe the disadvantage of having a multiuser system. The disadvantage of having a multiuser system is that it creates a single point of failure. If the multiuser system goes down, users can’t do their work.
  3. Describe preemptive multitasking. In preemptive multitasking, the scheduler decides when a process stops and another process starts. It assigns a certain amount of time to each process, which is referred to as “timesharing.” The scheduler starts high-priority processes sooner, giving them more time. Users don’t see this timesharing or notice interruptions in processes because the scheduler resumes stopped processes rapidly.
  4. Describe the BASH shell. Bourne Again (BASH) is the default shell in openSUSE and most other Linux distributions. Part of the Free Software Foundation’s GNU Projects, it has a history function that can also be used to remember commands entered in previous sessions as well as the current session.
  1. A(n) ____ is the physical computer where the virtual machine runs. A. DNS server B. image C. guest D. host
  2. A guest is the virtual machine using the host’s ____ hardware resources. A. simulated B. virtual C. physical D. logical
  3. During the openSUSE ____ phase, you select the user account and password. A. analysis B. configuration C. preparation D. installation
  1. During the openSUSE ____ phase, you set up Internet access. A. analysis B. configuration C. preparation D. installation
  2. The first window displayed when you install openSUSE is the ____ window. A. Boot Options B. Configuration C. System Options D. Welcome
  3. Which Boot Options window setting allows the system to boot into a minimal Linux system without a GUI? A. Repair Installed System B. Firmware Test C. Rescue System D. Memory Test
  1. If the openSUSE graphical installation causes problems, select ____ Mode. A. Clear Text B. Command Line C. Text D. Simple
    1. Which device is the openSUSE default installation medium? A. Hard drive B. USB C. Network D. CD-ROM
    2. What are the three choices available on the openSUSE Installation Mode window? A. New Installation, Update, and Repair Installed System B. Start Installation, Uninstall, and Repair Installed System C. Start Installation, Update, and Fix Installed System D. New Installation, Uninstall, and Redo Installed System
  2. Which openSUSE Installation Mode option would you select if you already have openSUSE installed and a newer version is available? A. New Installation B. Repair Installed System C. Update

D. Redo Installed System

  1. By default, the hardware clock is set to ____. A. Universal Time Coordinated (UTC) B. Greenwich Mean Time C. European Union Time D. United States Military Time
  2. Which openSUSE password is invalid? A. cantsee! B. Cantsea C. can’tC!! D. CANTSEE
  3. A ____ is a computer’s machine name in the network. A. domain name B. hostname C. network name

D. pointers

  1. A(n) ____________________ configuration enables you to install multiple OSs on one computer and choose which one to u when you start the computer. multiboot
  2. ____________________ is a special user account with full access to all system resources. Root
  3. A(n) ____________________ is the operating state of the Linux OS. runlevel
  4. ____________________ is a remote login program used to create a secure encrypted connection to a host on the network. Secure Shell (SSH) or Secure Shell or SSH
  5. ____________________ is a networking protocol that assigns IP addresses and other network configuration infor to hosts automatically. Dynamic Host Configuration Protocol (DHCP) or Dynamic Host Configuration Protocol or DHCP
  6. Match each item with a statement below.
  7. The default KDE file manager.Nautilus 3
  8. Used to digitally sign and encrypt eSpamAssassin-mails. 7
  9. The GNOME file manager. Virtual machine 9
  10. A virtual screen on the Linux desktop.GNU Privacy Guard and S/MIME 2
  11. The e-mail software included with GNOISO image ME. 6
  12. An archive file containing the contents of a CD or DVD. Evolution 5
  13. Scans for and filters junk mail.Blowfish 8
  14. The password encryption used in openSUSE.Dolphin 1
  15. A software container with its own OS, IP address, and applications. Workspace 4
  16. How does YaST assist with the Linux installation process? YaST guides you through the installation process by analyzing your current system components and displaying settings based on the analysis. During installation, YaST displays an overview of installation steps with help documents for each step.
  1. Why is it important to check your system configuration before installing openSUSE? Your system configuration determines how you install openSUSE. For example, you load different software applications during installation if you have a laptop rather than a desktop. You also load server applications if your system is to be used as a server or desktop applications if your system is to be used as a personal computer. To a beginner, these different configurations might sound a bit intimidating, but YaST is an excellent tool designed to help you perform these tasks easily.
  2. List three benefits of using virtualization in a network. Some benefits of using virtualization in a network include the following Allows running multiple OSs on one machine · Gives you the opportunity to test applications before actually installing them on a host machine · Reduces costs by decreasing the physical hardware that must be purchased for a network · Offers the chance to experiment with untested programs without infecting host machines with viruses or other malware
  3. Provide a brief overview of VMware Player. VMware Player 3.1.5 is a free application that enables you to create, configure, and run virtual machines on a Windows or Linux system. With VMware Player installed, a guest OS can access all the host machine’s hardware, including printers, network interface cards (NICs), and USB drives. A major benefit of having VMware Player is being able to create virtual machines to test different OSs and applications without concern about damaging the host.
  4. Describe the desktop environments available with openSUSE. OpenSUSE offers GNOME and KDE as desktop environments. You use the Desktop Selection window to choose which environment you want. If you select Other, three additional options are displayed: XFCE desktop, Minimal X Window, and Minimal Server selection (Text Mode). You might use one of these options if you don’t want a lot of default software packages installed on your computer. For instance, if your Linux system is being used as a server, you don’t need many of the graphical functions included with a desktop.
  5. Explain what Logical Volume Management (LVM) is and the benefit of using the feature. Logical Volume Management (LVM) is used to create virtual partitions that can span physical hard drives, which means you can resize partitions later, if needed. For instance, if you accept the default Partition Based option and later your /home partition fills up, you would have to delete files to free up space in that partition. With the LVM option, you can increase the size of the /home partition by resizing seldom used partitions such as /tmp and /share.