Cloud Infrastructure & Operation

  • CompTIA A+
  • LPI Linux Essentials
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sitti.fatimah
S
Sitti.fatimah
Community Contributor
Quizzes Created: 1 | Total Attempts: 198
| Attempts: 198 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. What is UNIX?

Explanation

UNIX is an open source operating system. Open source refers to a type of software that allows users to view, modify, and distribute the source code. This means that anyone can access and modify the underlying code of UNIX, making it highly customizable and adaptable to different needs. As an operating system, UNIX provides a platform for running software and managing computer hardware resources. It is known for its stability, security, and scalability, making it a popular choice for servers and high-performance computing environments.

Submit
Please wait...
About This Quiz
Cloud Infrastructure & Operation - Quiz

This quiz titled 'Cloud Infrastructure & Operation' assesses knowledge on Linux OS, focusing on system administration, kernel functions, and vi editor commands. It is designed for learners looking to enhance their technical skills in managing and operating Linux systems.

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following is the main portion or also known as the heart of LINUX?

Explanation

The kernel is considered the main portion or heart of LINUX because it is the core component that interacts directly with the hardware and manages system resources. It provides essential services such as process management, memory management, device drivers, and file system access. The kernel is responsible for maintaining the stability, security, and overall functioning of the operating system. Without the kernel, LINUX would not be able to function properly.

Submit
3. Which of the following is NOT a cloud service model?

Explanation

FaaS stands for Function as a Service, which is a cloud computing model where developers can execute individual functions in the cloud without managing the infrastructure. It allows developers to focus solely on writing and deploying code, without worrying about servers or scaling. Therefore, FaaS is indeed a cloud service model, making it the incorrect answer for this question.

Submit
4. Which of the following keystroke allow user to save and exit vi editor?

Explanation

The correct answer is "esc + :wq". In the vi editor, pressing the escape key (esc) allows the user to enter command mode. The ":wq" command in vi stands for "write and quit", which saves the changes made to the file and exits the editor. Therefore, pressing escape followed by ":wq" allows the user to save and exit the vi editor.

Submit
5. Which command allow user to delete a directory?

Explanation

The correct answer is "rmdir". This command is used to remove or delete a directory in a file system. It is specifically designed for deleting directories and will only work if the directory is empty. If the directory contains any files or subdirectories, the command will not work and an error message will be displayed. Therefore, "rmdir" is the appropriate command to delete a directory.

Submit
6. Which of the following keystroke allow user to delete one line of words in vi editor?

Explanation

In vi editor, the keystroke "esc + dd" allows the user to delete one line of words. The "esc" key is used to switch from insert mode to command mode, and the "dd" command is used to delete the current line. So, pressing "esc" followed by "dd" will delete the line the cursor is currently on.

Submit
7. What is the command to change the permission access -rwxrw-r-- of test2.txt?

Explanation

The command "chmod 764 test2.txt" is the correct answer because it changes the permission access of "test2.txt" to -rwxrw-r--. In the chmod command, the first digit represents the owner's permission, the second digit represents the group's permission, and the third digit represents the others' permission. In this case, the owner has read, write, and execute permissions (7), the group has read and write permissions (6), and others have read-only permission (4).

Submit
8. Which of the following statement is NOT an advantage of LINUX?

Explanation

The statement "LINUX is cheap" is not an advantage of LINUX because although LINUX is an open-source operating system and can be obtained for free, the cost associated with implementing and maintaining a LINUX system can still be significant. This includes expenses related to hardware, software, training, and technical support. Therefore, while LINUX may be cost-effective compared to some proprietary operating systems, it is not necessarily cheap in all aspects.

Submit
9. What SUDO program does?

Explanation

The SUDO program allows users to access root privileges on a system. This means that users can execute commands and perform tasks that are typically restricted to the system administrator. By using SUDO, users can temporarily elevate their privileges and perform administrative tasks without having to log in as the root user. This helps to enhance security and limit the potential damage that can be caused by unauthorized access to system resources.

Submit
10. Which cloud deployment model is use if there is a needs for sharing data, platform and applications to a specific group with a common goal?

Explanation

A community cloud deployment model is used when there is a need for sharing data, platform, and applications among a specific group with a common goal. In a community cloud, multiple organizations or individuals with similar interests or requirements come together to share resources and collaborate on projects. This model allows for cost-sharing, increased security, and customized solutions tailored to the specific needs of the community members.

Submit
11. Which of the following symbol represent the CORRECT permission access to test.txt if the owner & group access were given read & writes permission while the guest was only allowed to read?

Explanation

The correct answer is "-rw-rw-r--". In this symbol, the first character "-" represents a regular file, the next three characters "rw-" represent the owner's permission as read and write, the next three characters "rw-" represent the group's permission as read and write, and the last three characters "r--" represent the guest's permission as read only.

Submit
12. Which one of the following is use to automate the creation, monitoring and deployment of resources in data centre?

Explanation

Orchestrator is the correct answer because it is a tool used to automate the creation, monitoring, and deployment of resources in a data center. It helps in managing and coordinating various tasks and workflows, allowing for efficient and streamlined operations. OVF (Open Virtualization Format) is a standard for packaging and distributing virtual machines, but it does not specifically focus on automation or resource management. Service Manager is a tool for managing and automating IT service delivery, but it may not have the same level of focus on data center resources as Orchestrator. Virtual Machine Manager is a tool for managing virtual machines, but it may not cover the broader range of data center resource automation that Orchestrator does.

Submit
13. Which of the following describe the directory /dev/hdb?

Explanation

The directory /dev/hdb is described as a "Hard disk (slave)". This indicates that it is a secondary hard disk drive connected to the computer. In a master-slave configuration, the primary hard disk is the master, and the secondary hard disk is the slave. The slave drive typically has a lower priority and is used for additional storage or backup purposes.

Submit
14. How to achieve a secure connection between your Private Cloud and Public Cloud provider?

Explanation

To achieve a secure connection between a Private Cloud and a Public Cloud provider, the environment can be connected through a Virtual Private Network (VPN). A VPN creates a secure and encrypted connection between the two networks, ensuring that data transmitted between them is protected from unauthorized access. By establishing a VPN connection, organizations can securely transfer data and communicate between their Private Cloud and the Public Cloud provider, minimizing the risk of data breaches and ensuring the confidentiality and integrity of their information.

Submit
15. Which of the following attack is best prevented by a strong encryption services that are based on cryptography only?

Explanation

A strong encryption service based on cryptography can effectively prevent mapping attacks. Mapping attacks involve gathering information about a network or system to identify vulnerabilities and potential points of entry. By encrypting the data, it becomes extremely difficult for attackers to decipher and gain insights into the network or system's structure and weaknesses. This ensures that even if attackers manage to intercept the encrypted data, they will not be able to extract any valuable information from it. Therefore, a strong encryption service based on cryptography is the best defense against mapping attacks.

Submit
16. #!/bin/bash #My first shell script echo Hello World Which of the following statement is TRUE?

Explanation

The correct answer is "tell LINUX that the file is to be executed by bin/bash". This is because the first line in the script "#!/bin/bash" is known as the shebang, and it specifies the interpreter to be used to execute the script, which in this case is the bash shell.

Submit
17. Which cloud deployment model is solution if there is a needs for high degree of governance?

Explanation

A private cloud deployment model is the solution if there is a need for a high degree of governance. In a private cloud, the infrastructure is dedicated to a single organization, providing them with full control over security, compliance, and data governance. This allows the organization to implement strict governance policies and ensure that their sensitive data and resources are protected. Compared to public or hybrid clouds, a private cloud offers a higher level of control and customization, making it suitable for organizations with specific governance requirements.

Submit
18. What type of attack that occurs when someone between you and the person with whom you are communicating is actively monitoring and controlling your communication transparently. 

Explanation

Hijacking is the correct answer because it refers to a type of attack where an unauthorized person intercepts and takes control of a communication session between two parties. This attacker can monitor and manipulate the communication without the knowledge of the communicating parties. Hijacking can occur in various forms, such as session hijacking or man-in-the-middle attacks, where the attacker can eavesdrop on the communication, alter the data being transmitted, or even impersonate one of the parties involved.

Submit
19. Most of the configuration file is stored in the /etc directory. Which of the following is classified under system administration category? 

Explanation

The file "/etc/nologin" is classified under the system administration category because it is used to prevent users from logging into the system. When this file exists, it displays a message to users attempting to log in and denies them access. This file is commonly used during system maintenance or when the administrator wants to restrict user access temporarily.

Submit
20. What does SOA stands for?

Explanation

SOA stands for Service Oriented Architecture. It is a design approach that organizes software components as services, which can be accessed and reused by different applications. This architecture promotes loose coupling, flexibility, and interoperability between systems. It allows businesses to integrate and combine various software components and services to create new applications or modify existing ones easily.

Submit
21. Which of this is NOT a form of DoS attack?

Explanation

Device Denial-of-Service Attacks is not a form of DoS attack. A DoS attack is designed to overwhelm or disrupt the normal functioning of a network, system, or device. Buffer Overflow Attacks, SYN floods, and Smurf Attacks are all examples of DoS attacks. However, Device Denial-of-Service Attacks refers to attacks that target specific devices, such as routers or switches, rather than the entire network or system. These attacks aim to exhaust the resources of the targeted device, causing it to become unresponsive or unavailable.

Submit
22. What does the bin sub-directory contains?

Explanation

The bin sub-directory in Linux contains programs that correspond to core Linux commands. These programs are essential for the functioning of the Linux system and are used for various tasks and operations. The bin directory is typically included in the system's PATH variable, allowing users to easily access these core commands from any directory in the system.

Submit
23. Which of the following is NOT the limitation of cloud computing?

Explanation

Automated updates are not a limitation of cloud computing because they are actually a benefit. Cloud computing allows for automatic updates to be applied to software and systems, ensuring that users always have the latest features and security patches without needing to manually install them. This helps to improve efficiency and reduce the risk of security vulnerabilities. Therefore, automated updates are not a limitation, but rather a valuable feature of cloud computing.

Submit
24. Which class does 16 ports SAN switch with a single controller component classified?

Explanation

A 16 ports SAN switch with a single controller component is classified as a Modular Class. This means that the switch has a modular design, allowing for expansion and customization by adding additional modules or components as needed. The single controller component indicates that there is only one controller managing the switch's operations.

Submit
25. Which of the following is NOT a SAN component layer?

Explanation

The Access Layer is not a SAN component layer. In a Storage Area Network (SAN), the Access Layer refers to the layer that provides connectivity between the SAN fabric and the servers or hosts. It includes components such as host bus adapters (HBAs) and network switches. The Host Layer, Fabric Layer, and Storage Layer are all valid SAN component layers. The Host Layer consists of the servers or hosts that access the SAN. The Fabric Layer includes the network switches and other devices that form the SAN fabric. The Storage Layer refers to the storage devices, such as disk arrays or tape libraries, that store the data in the SAN.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 9, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 09, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 07, 2013
    Quiz Created by
    Sitti.fatimah
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is UNIX?
Which of the following is the main portion or also known as the heart...
Which of the following is NOT a cloud service model?
Which of the following keystroke allow user to save and exit vi...
Which command allow user to delete a directory?
Which of the following keystroke allow user to delete one line of...
What is the command to change the permission access -rwxrw-r-- of...
Which of the following statement is NOT an advantage of LINUX?
What SUDO program does?
Which cloud deployment model is use if there is a needs for sharing...
Which of the following symbol represent the CORRECT permission access...
Which one of the following is use to automate the creation, monitoring...
Which of the following describe the directory /dev/hdb?
How to achieve a secure connection between your Private Cloud and...
Which of the following attack is best prevented by a strong encryption...
#!/bin/bash ...
Which cloud deployment model is solution if there is a needs for high...
What type of attack that occurs when someone between you and the...
Most of the configuration file is stored in the /etc directory. ...
What does SOA stands for?
Which of this is NOT a form of DoS attack?
What does the bin sub-directory contains?
Which of the following is NOT the limitation of cloud computing?
Which class does 16 ports SAN switch with a single controller...
Which of the following is NOT a SAN component layer?
Alert!

Advertisement