Get All Modules System Administration and IT Infrastructure Services Quiz Answers
Table of Contents
Q1. Whose responsibility might it be to form organizational computer and network policies? Select all that apply.
Answer:
The sysadmin
Chief Security Officer
Explanation:
The sysadmin and the Chief Security Officer (CSO) play crucial roles in forming computer and network policies. The sysadmin manages technical implementation, while the CSO ensures security policies align with organizational goals. The board of directors and CEO generally oversee strategy but do not directly create policies.
Q2. Which of these are common responsibilities of systems administrators? Check all that apply.
Answer:
Help users with issues, such as lost passwords and login problems
Work in the background to make sure a company’s IT infrastructure is always working
Constantly troubleshoot problems, such as network issues
Explanation:
Sysadmins ensure smooth IT operations by addressing user issues, maintaining infrastructure, and troubleshooting problems. Helping users choose a chair is unrelated to their responsibilities.
Q3. What device is commonly used to connect to and control multiple computers using a single keyboard, mouse, and monitor?
Answer: KVM switch
Explanation: A KVM (Keyboard, Video, Mouse) switch allows users to control multiple computers with a single set of peripherals, streamlining operations.
Q4. What is a machine that uses services provided by a server called?
Answer: Client
Explanation: A client is a machine or device that accesses resources or services hosted on a server.
Q5. Which of these terms describe a facility that stores hundreds, if not thousands, of servers?
Answer: Data center
Explanation: A data center is a physical facility housing servers, storage systems, and networking equipment to support large-scale IT operations.
Q6. Which of the following are considerations when developing computer policies? (Choose all that apply)
Answer:
Should users be able to install software
Should a password be set on an employee's company phone?
Should users be able to view non-work-related websites, like Facebook?
Explanation:
Key policy considerations include software installation permissions, device security settings, and acceptable use of non-work-related websites. Monitor brightness is typically a user preference.
Q7. Broken computers are being eco-recycled. In which stage of the hardware lifecycle does this scenario belong to?
Answer: Retirement
Explanation: The retirement phase involves decommissioning old or broken hardware and recycling it responsibly.
Q8. An IT department submits a purchase order to buy a new computer from a vendor. Which stage of the hardware lifecycle does this scenario belong to?
Answer: Procurement
Explanation: Procurement is the stage where hardware is selected and purchased to meet organizational needs.
Q9. An IT department uses a pre-used laptop out of their hardware inventory for a new user. Which stage of the hardware lifecycle does this scenario belong to?
Answer: Deployment
Explanation: Deployment involves configuring and assigning hardware to end users, including reusing existing inventory.
Q10. An employee is starting at the company. Which of these steps are appropriate to take during onboarding? (Choose all that apply)
Answer:
Providing instructions on how to log into their new machine, get email etc.
Install software the user needs on their machine
Explanation:
Onboarding includes providing necessary instructions and setting up the employee’s machine with required software. Personal laptops are not typically part of the onboarding process, and logon information is usually assigned, not collected.
Get All Graded Quiz Answers of System Administration and IT Infrastructure Services >>
Module 01 Challenge: What is System Administration? Quiz Answers
Module 02 Challenge: Network Services Quiz Answers
Module 03 Challenge: Software and Platform Services Quiz Answers
Module 04 Challenge: Directory Services Quiz Answers
Module 05 Challenge: Data Recovery & Backups Quiz Answers