Pre-Exam test II

Beschreibung

Quiz am Pre-Exam test II, erstellt von Shahmeran Gilani am 08/08/2016.
Shahmeran Gilani
Quiz von Shahmeran Gilani, aktualisiert more than 1 year ago
Shahmeran Gilani
Erstellt von Shahmeran Gilani vor mehr als 8 Jahre
1053
0

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following are questions to ask for backup strategy?
Antworten
  • What kind of rotation schedule is followed for backups
  • What time will the backups occur
  • How long to save backups?
  • Where is the Media/Documentation stored
  • Who is responsible for ensuring the backup occured
  • Who will verify the accuracy of backups
  • Who will dictate who does the back ups
  • Who will decide where to buy stuff from

Frage 2

Frage
There are 3 types of Cloud Service Models. They are [blank_start]SAAS[blank_end] , IAAS and [blank_start]PAAS[blank_end]. SAAS deals with a generic [blank_start]application[blank_end] on the web. IAAS provides machines , resourses , network and storage all avaiable for clients to [blank_start]upload[blank_end] their own [blank_start]applications[blank_end] and manage them. PAAS provides a place for clients to put their apps on the servers with provided hard drives , O/S and connections with [blank_start]development[blank_end] tools
Antworten
  • SAAS
  • Paaz
  • Lass
  • PAAS
  • ASSD
  • TAZS
  • application
  • storage
  • devices
  • upload
  • download
  • extract
  • applications
  • hardware
  • patches
  • development
  • spying
  • computing

Frage 3

Frage
Private Cloud is
Antworten
  • Owned, managed and accessed only by 1 organization
  • Available for use by general public
  • Combination of public and private
  • Shared by 2 or several organizations

Frage 4

Frage
Public cloud is
Antworten
  • Available for use by general public
  • Owned, managed and accessed only by 1 organization
  • Shared by 2 or several organizations

Frage 5

Frage
Hybrid Cloud is
Antworten
  • Shared by 2 or several organizations
  • Combination of pubic and private cloud
  • Private cloud

Frage 6

Frage
Advantages of SAAS are
Antworten
  • Allow flexibility in costs (pay on demand)
  • Scalability and device dependence
  • Business continuity and Disaster recovery built-in
  • Highly secure

Frage 7

Frage
Disadvantages of SAAS
Antworten
  • Customization difficult / expensive
  • Control / security of data
  • Moving of application / exporting of data
  • Eliminate need for on site data center
  • Scalability and device independence
  • Takes a toll on IT services

Frage 8

Frage
Advantages of PAAS
Antworten
  • Reduced cost of infrastructure
  • Less server administration knowledge / costs
  • Greater system uptime
  • Scalability
  • Need QoS agreements to enforce needs
  • Requires multiple tenants before service is offered

Frage 9

Frage
Disadvantages of PAAS
Antworten
  • Concern about data security
  • Challenges with legacy software
  • Need QoS agreements to enforce needs
  • Web Hosting
  • Unable to deploy applications on same day

Frage 10

Frage
Advantages of IAAS
Antworten
  • Eliminate need for own data center (co-locate), leads to reduced cost
  • Ease of scalability
  • Strict demand costs
  • Increase in IT staffing requirements
  • Ad hoc test environments
  • Complete systems administration and management

Frage 11

Frage
What resources can be shared on the cloud?
Antworten
  • CPU
  • RAM
  • Storage (disk space)
  • Network (capacity and speed)
  • Printing
  • USB
  • Optical Drives

Frage 12

Frage
If a computer is left powered on, it automatically creates a check point every how many hours?
Antworten
  • 12
  • 18
  • 24
  • 48
  • 90

Frage 13

Frage
After how many days will a restore point be deleted?
Antworten
  • 10
  • 20
  • 30
  • 60
  • 90
  • 120

Frage 14

Frage
System restore will backup user files.
Antworten
  • True
  • False

Frage 15

Frage
System restore is enabled by default
Antworten
  • True
  • False

Frage 16

Frage
If you disable System Restore you will not loose all the checkpoints.
Antworten
  • True
  • False

Frage 17

Frage
System Restore is a service running in the background
Antworten
  • True
  • False

Frage 18

Frage
a snapshot of necessary system settings, files, folders, and registry keys to keep a point in time reference, is know as a checkpoint
Antworten
  • True
  • False

Frage 19

Frage
By default System Restore uses [blank_start]3-5%[blank_end] of available disk space for each drive that it is set to monitor, up to a maximum of [blank_start]10GB[blank_end]
Antworten
  • 3-5%
  • 5-10%
  • 10-15%
  • 10GB
  • 20GB
  • 15GB

Frage 20

Frage
System Restore automatically deletes restore points after ninety days (this frequency can be adjusted in the Registry).
Antworten
  • True
  • False

Frage 21

Frage
What conditions will cause the creation of a checkpoint
Antworten
  • You Download a new game
  • You install a Windows update or patch
  • You install an unsigned device driver
  • You install an application that uses an installer that is System Restore aware
  • You restore a prior configuration with System Restore
  • You restore data from a backup set created with Windows NTbackup program
  • You manually create a checkpoint using the System Restore Wizard.
  • You change BIOS settings

Frage 22

Frage
All operating systems need to have a stored reference area that: Contains information about what drivers to load User configuration preferences Application settings
Antworten
  • True
  • False

Frage 23

Frage
With DOS these settings were stored in a couple of files; namely config.sys and autoexec.bat
Antworten
  • True
  • False

Frage 24

Frage
Windows 3.x operating system utilized two more files; namely win.ini and system.ini
Antworten
  • True
  • False

Frage 25

Frage
Registry information is stored in files that have a [blank_start]binary[blank_end] format
Antworten
  • binary
  • String
  • Bool

Frage 26

Frage
Registry information is never locked by the operating system,
Antworten
  • True
  • False

Frage 27

Frage
The grouping of different categories of registry information is known as [blank_start]“hives”[blank_end]
Antworten
  • Hives
  • Keys
  • Sub Keys
  • Values

Frage 28

Frage
HKEY_LOCAL_MACHINE” or HKLM handles the hardware information
Antworten
  • True
  • False

Frage 29

Frage
HKEY_CURRENT_USER”, or HKCU stores
Antworten
  • Bootup information
  • Desktop settings
  • user and application settings

Frage 30

Frage
Supporting files for “HKEY_CURRENT_USER”, or HKCU are typically located in the user’s profile folder within the “Users” folder. The primary file is named “ntuser.dat”.
Antworten
  • True
  • False

Frage 31

Frage
Another popular format is the [blank_start]registration file[blank_end] format ([blank_start].reg extension[blank_end]).
Antworten
  • registration file
  • registry file
  • reg file
  • .reg
  • exe
  • rpt
  • FILE

Frage 32

Frage
The major difference between the registry hive file format and registration file format
Antworten
  • The registry hive file format can add and remove keys, subkeys, and values. The registration file format can only add or change keys, subkeys, and values.
  • The registry hive file format can delete keys and the registration file format can't
  • Neither can affect the registry.
  • restores the registry in case of corruption

Frage 33

Frage
What was a limitation of Windows 3.x win.ini and system.ini files?
Antworten
  • A major problem was the fact that the operating system had to read both files line by line as it came up, so that the longer the files were, the slower the boot process.
  • Users were getting themselves into trouble by making changes to the INI files.
  • It was possible for the user to inadvertently delete an INI file
  • It was not possible to set security setting on specific file entries.
  • The files could be renamed
  • The ussers could delete the INI file while the OS was working

Frage 34

Frage
Worms :
Antworten
  • programs that replicate themselves over a computer network. —
  • can be considered a sub-class of viruses
  • may be able to propagate without any action on the victim's part
  • masquerade as benign applications
  • try to trash your computer

Frage 35

Frage
Trojan Horses :
Antworten
  • masquerade as benign applications
  • do not replicate themselves but are often used as 'droppers' of viruses
  • —is not a virus at all but a message warning you about the threat of a (non-existent) new virus
  • replicate themselves over a computer network
  • they will just try to trash your computer.

Frage 36

Frage
Hoax are
Antworten
  • not a virus at all but a message warning you about the threat of a (non-existent) new virus
  • try to trash your computer.
  • masquerade as benign applications
  • replicate themselves over a computer network
  • sub-class of viruses

Frage 37

Frage
EXE and COM virus mechanism was to
Antworten
  • —Add themselves to programs already residing on the victim computer
  • alter the executable code in such a way that they would execute first and then hand over control to their host
  • —spread by being shared via floppies (USB key today) or the Internet
  • replicate themselves over a computer network
  • do not replicate themselves but are often used as 'droppers' of viruses.—
  • stir up anxiety and waste people's time

Frage 38

Frage
Boot Sector viruses
Antworten
  • programs that would reside on the boot sectors of floppy or Hard disks.
  • Had the CMOS counter measure added to prevent infection
  • Is not a virus at all but a message warning you about the threat
  • programs that masquerade as benign applications
  • programs that replicate themselves over a computer network

Frage 39

Frage
When you open a virus type file in notepad, if the first two letters are either MZ or PE then the file contains an executable file.
Antworten
  • True
  • False

Frage 40

Frage
A signature of a virus contains
Antworten
  • string of characters, such as a message that the virus will display on the screen when activated
  • Binary computer code or even a particular bit of data that is embedded in the virus.
  • Users IP address

Frage 41

Frage
Spyeware is
Antworten
  • Any software that covertly gathers user information through the user's Internet connection without his or her knowledge
  • is not a virus at all but a message warning you about the threat of a (non-existent) new virus
  • —programs that masquerade as benign applications.

Frage 42

Frage
Spy ware consists of :
Antworten
  • key loggers, screen capture devices, and Trojans
  • Software that is installed alongside other software or via activex controls on the internet
  • Benign Executible files

Frage 43

Frage
—Risk-ware is
Antworten
  • name given to legitimate programs that can cause damage if they are exploited by malicious users
  • Programs are not designed to be malicious – but they do have functions that can be used for malicious purposes.
  • —File downloaders
  • —Software for monitoring computer activity
  • Actual viruses
  • Key loggers

Frage 44

Frage
The Master boot record has the following properties
Antworten
  • only 2TB supported
  • First sector on disk
  • part of legacy bios
  • has 4 primary partitions

Frage 45

Frage
____ is a widely released fix for a specific problem that addresses a critical, non-security-related bug.
Antworten
  • Critical Updates
  • Definition updates
  • A Driver

Frage 46

Frage
___ is a widely released and frequent software update that contains additions to a product’s definition database. Definition databases are often used to detect objects that have specific attributes, such as malicious code, phishing websites, or junk mail.
Antworten
  • Definition update
  • Critical Update
  • Driver update

Frage 47

Frage
__ is new product functionality that is first distributed outside the context of a product release and that is typically included in the next full product release.
Antworten
  • Feature pack
  • Security Update
  • Tool

Frage 48

Frage
__ is a widely released fix for a product-specific, security-related vulnerability. Security vulnerabilities are rated by their severity. The severity rating is indicated in the Microsoft security bulletin as critical, important, moderate, or low.
Antworten
  • Security update
  • Feature Pack
  • Tool
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Statistik und Differenzialgleichungen
barbara91
IKA-Theoriefragen Serie 03 (15 Fragen)
IKA ON ICT GmbH
Grundlagenwissen DaZ
p s
Netzwerktechnik
DFairy
Klinische Psychologie Teil 2
Lisa Mariá Hchil
Wirk Uni Wien Teil 2
lazer der boss
Die Geschichte der DDR von 1945-1989
Wie Ja
Kommunikationssoziologie (KSOZ) Grimm 2017/18
Benedikt Zöchling
Orthopädie Pferd Bildgebung Vetie
Fenja Joseph
Milchkunde 2019 - Vetie
Peter Christian Ponn
Vetie Fleisch 2021
Mascha K.