Large Sys Tech

Card Set Information

Large Sys Tech
2011-10-02 16:38:42
networking virtualization client server

Exam 1
Show Answers:

  1. What is the main difference between a mainframe and a supercomputer?
    Mainframes can do multiple jobs very quickly, while supercomputers can only do one job very quickly.
  2. What is the definition of “Distributed or Open” Systems?
    Networks of smaller systems built to interact with one-another to form a Large System.
  3. What is the speed of a mainframe measured in?
    MIPS – Millions of Instructions per Second
  4. TRUE/FALSE: Mainframes run scheduled BATCH jobs that run without user input.
  5. Short Answer: What are Large Systems?
    A collection of multiple smaller systems that together serve a purpose or perform a business function.
  6. Which of the following are components of Large Systems?
    Datacenter Management, Network Engineering, Client/Server Engineering, Telephony and Call Routing, IT Security, Messaging and Collaboration, Database Systems
  7. True or False: VPN is NOT a secure connection between networks.
  8. TRUE/FALSE: VLAN is a Layer 3 (Network Layer) concept.
    False - VLAN is a Layer 2 (Data Link) concept.
  9. Which device operates at layer 3 (the Network Layer) of the OSI model?
    The Router
  10. How many layers are there in the OSI model?
  11. What are the benefits of layering within a reference model?
    Less Complex – breaks concepts into smaller pieces – development of individual protocols for layer-to-layer communication

    Standard interfaces – allows for multiple vendors to create products that compete to be used for a give function

    Easier to learn – enables us to learn individual protocol specs for each layer

    Easier to develop – can develop protocols to do specific tasks as defined for the layer

    Multivendor Interoperability – Allows multiple vendors to develop to standard of specs

    Modular Engineering – can create solutions to problems at each layer, invoking technology from higher and/or lower layers
  12. What are the 7 layers of the OSI model IN ORDER?
    • 7. Application
    • 6. Presentation
    • 5. Session
    • 4. Transport
    • 3. Network
    • 2. Data Link
    • 1. Physical
  13. At which layer of the OSI model do the Hub, Switch and Router reside?
    • Hubs – Layer 1
    • Switches/Bridges – Layer 2
    • Routers/Firewalls – Layer 3
  14. What is the Definition of the MAC Address?
    The MAC Address is the physical address of the machine that is burned onto the machine’s Network Interface Card.
  15. What is the difference between the MAC address of a machine and the IP Address of a machine?
    The MAC Address is the burned in address of the machine and is not intended to ever change. The IP Address is a logical address that the machine uses and changes when the machine moves to different networks (For example, moving from building to building). Remember that the MAC address is static and the IP Address is dynamic.
  16. What is NOT one of the minimum requirements for network communication?
    IP Address, Subnet Mask, Default Gateway
  17. What is the protocol that dynamically assigns IP addresses to machines on a network?
    The Dynamic Host Configuration Protocol
  18. Which protocol is used to resolve HOST NAMES to IP Addresses?
    The Domain Name System (DNS)
  19. What are the two main functions of IP – the Internet Protocol?
    Route Selection and Logical Addressing
  20. What is the main difference between TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)?
    TCP provides reliable delivery while UDP does not
  21. What are the two components of an IP Address?
    Network and Host
  22. What mechanism is built into Ethernet to allow it to avoid collisions on the network?
    CSMA/CD – Carrier Sense Multiple-Access with Collision Detection
  23. What is one advantage to using IPv6 over IPv4?
    IPv6 supports encryption whereas applications provide encryption in IPv4
  24. True or False – A Router separates collision domains whereas a switch separates broadcast domains?
    FALSE – (It is the other way around – a router separates broadcast domains whereas a switch separates collision domains)
  25. What was the significance of the release of the Macintosh Computer in 1984?
    It was the first commercially successful computer to feature a GUI (Graphical User Interface) and a mouse.
  26. What are the names of some popular LINUX distributions?
    Ubuntu, Suse, Red Hat, Mandrake
  27. What is one perceived advantage to running Linux as opposed to Windows?
    Linux is more secure and is less likely to be compromised by viruses or malware.
  28. Who Created the Linux Operating System?
    Linus Torvalds in 1991
  29. State Moore’s Law:
    The number of transistors that can be placed inexpensively on an Integrated Circuit doubles every two years.
  30. Which version of Windows introduced Microsoft’s Active Directory?
    Windows 2000
  31. What is one major difference between the UNIX and Windows Operating Systems?
    UNIX does a better job of managing users and their processes than does Windows.
  32. True or False – IBM’s OS/2 and Microsoft Windows 95 were the first two major operating systems to be installed independent of MS DOS.
  33. True or False – In the event of a Windows System crash, one way to potentially recover files from the damaged system is to boot the machine to either MS DOS or Linux, access the file system of the machine and remove important files.
  34. Which of the following is generally considered a security advantage of the Microsoft Windows Vista and Windows 7 Operating Systems?
    Bitlocker Support
  35. What does RAID stand for?
    Redundant Array of Independent Disks
  36. What is the purpose of using RAID when creating a disk array?
    RAID increases performance and (with the exception for RAID 0) provides fault tolerance in the event of a physical disk failure.
  37. Who created the UNIX Operating System and where were they working when they created it?
    Ken Thompson and Dennis Ritchie at Bell Labs
  38. What are some Key Characteristics of the Mainframe?
    Centralized Processing as opposed to Distributed Processing, Used by multiple users at the same time – true multitasking, Ability to do Multiple jobs very quickly
  39. What is one of the main reasons that the Mainframe has a continued presence in the Business World?
    Its ability to solve multiple business problems very quickly with little to no downtime.
  40. What is a main reason that business tend to invest in Client/Server or Distributed systems?
    Scalability, Flexibility, Interoperability, Redundancy
  41. In general, why is business so interested in the virtualization of their server infrastructure?
    Hardware consolidation – fewer physical servers needed, Better resource utilization
  42. What type of virtualization is commonly used in SANs?
    Storage Virtualization
  43. What were the two types of Hypervisors discussed in class?
    Bare Metal and Hosted
  44. True or False – A Hypervisor emulates computer hardware, allowing multiple Operating Systems to run on a single physical host.
  45. What are two disadvantages of Virtualization?
    High Initial Investment, Requires a great deal of redundancy and fault tolerance.
  46. True or False - In Traditional Cloud Computing, the user does NOT own his or her physical infrastructure.
  47. What is the advantage of a “Private Cloud” to business?
    A private cloud allows a business to invest in the architecture and technologies to provide cloud services within the organization without involving a service provider.
  48. What is “Cloud Computing”?
    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.
  49. The process of using application software to abstract the operating system, applications, and data from the user's PC is referred to as:
  50. True or False? A Virtual Private Network can be used to grant telecommuters or remote users access to a company's network.
  51. What is one reason why companies may be slow to adopt virtual environments?
    Requires a paradigm shift – It is sometimes difficult to convince people that virtual environments are viable
  52. What is an example of Network Virtualization?
    The Virtual LAN or VLAN
  53. What is an inherent risk of running production servers in a Virtual Environment?
    If the server that is hosting the Virtual Machines goes down, all machines running on the host Server will be lost as well.
  54. True or False – The SAN is an integral part of a Virtual Server solution because it is through the use of external storage that virtual machines can be moved between physical hosts.
  55. What is the definition of a VLAN?
    A VLAN is a logical segregation of a network into individual broadcast domains.
  56. What is the Idea of a “Private Cloud” and why is it an important concept?
    The idea of a “Private Cloud” is that every piece of data that you might ever need is available at your fingertips from multiple devices (smartphones, laptops, tablets, etc).
  57. What is one of the main risks of Cloud Computing?
    The loss of Privacy