option
Questions
ayuda
daypo
search.php

NOS part 3

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
NOS part 3

Description:
Chapter 10 + 11

Creation Date: 2026/01/06

Category: Others

Number of questions: 80

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What is the primary purpose of a Network Operating System (NOS)?. To manage a single computer’s hardware. To coordinate activities across multiple networked devices. To replace standalone operating systems. To focus solely on internet connectivity.

Which of the following is NOT a function of an NOS?. File sharing. User authentication. Managing local printer drivers. Remote access.

In a peer-to-peer (P2P) NOS model, each device acts as: Only a client. Only a server. Both a client and a server. A network switch.

Which NOS model is best suited for a network with 500 users?. Peer-to-Peer. Client/Server. Standalone. Ad-hoc.

Which protocol is commonly used for file sharing in Windows environments?. NFS. LDAP. SMB. NTP.

What does LDAP stand for in the context of NOS?. Lightweight Directory Access Protocol. Local Data Access Protocol. Linked Directory Authentication Protocol. Layered Data Access Protocol.

Which security mechanism uses tickets to authenticate users in Active Directory?. IPsec. Kerberos. SSH. SSL/TLS.

What is the role of Access Control Lists (ACLs) in an NOS?. To encrypt network traffic. To define user permissions for resources. To monitor network performance. To schedule backups.

Which component of an NOS manages core system resources like CPU and memory?. File System Manager. Kernel. Network Manager. Security Module.

What is a key advantage of the client/server NOS model over P2P?. Lower hardware costs. Centralized management. Simpler configuration. No need for a server.

Which protocol synchronizes clocks across networked devices?. RPC. NTP. CIFS. SMB.

What does NFS primarily enable in Unix/Linux systems?. Printer sharing. File access sharing across networks. User authentication. Network monitoring.

Which tool is commonly used to monitor NOS performance?. Nagios. Notepad. Excel. Paint.

What is a common backup strategy implemented by an NOS?. Manual file deletion. Scheduled backups to cloud storage. Disabling network access. Ignoring data recovery.

Which NOS feature allows remote workers to securely access a network?. Directory Services. Remote Access via VPN. Printer Sharing. Resource Monitoring.

What is the main limitation of a peer-to-peer NOS?. High cost. Lack of centralized control. Requires dedicated servers. Complex configuration.

Which security protocol secures IP communications for VPNs?. Kerberos. IPsec. SSH. SSL/TLS.

What does Active Directory provide in a Microsoft NOS?. Decentralized user management. Centralized authentication and policies. Local file storage only. Printer queue management.

Which NOS component routes data between devices?. Kernel. Network Manager. File System Manager. User Interface.

How does an NOS manage printer sharing?. By disabling all printers. By managing print queues and job prioritization. By limiting access to a single user. By ignoring printer requests.

What is the purpose of multi-factor authentication (MFA) in an NOS?. To speed up login times. To enhance security with multiple verification steps. To reduce network traffic. To disable user accounts.

Which protocol extends SMB for cross-platform compatibility?. CIFS. RPC. NTP. LDAP.

What is a key benefit of using user groups in an NOS?. Increases network downtime. Simplifies permission management. Limits file sharing. Disables security features.

Which NOS component enforces authentication and encryption?. Kernel. Security Module. Network Manager. File System Manager.

What is the primary role of the File System Manager in an NOS?. To route and protect network traffic. To organize and protect files. To monitor user activity. To manage printer queues.

Which topology is commonly supported by an NOS?. Linear. Local Area Network (LAN). Single-node. Isolated.

What does SSH provide in an NOS environment?. Encrypted remote access. File sharing. Printer management. Time synchronization.

Which NOS function helps recover data after a failure?. Resource Monitoring. Backup and Recovery. User Authentication. Directory Services.

What is a disadvantage of the client/server NOS model?. Lack of scalability. High hardware investment. No security features. Simple setup.

Which protocol is foundational to distributed computing in NOS?. SMB. RPC. NTP. LDAP.

How does an NOS ensure equitable resource use across users?. By disabling resources. By allocating resources based on demand/role. By ignoring user requests. By limiting network access.

What is the purpose of Intrusion Detection Systems (IDS) in an NOS?. To increase network traffic. To monitor for suspicious activity. To disable firewalls. To encrypt files.

Which NOS feature supports single sign-on (SSO)?. Active Directory. Peer-to-Peer Sharing. Printer Queues. Backup Schedules.

What is a common use case for a peer-to-peer NOS?. Large corporate networks. Small home offices. Government data centers. International WANs.

Which NOS component provides a graphical user interface for administration?. Kernel. User Interface. Network Manager. Security Module.

What does encryption in NOS protect against?. Hardware failures. Data interception. Software updates. User permissions.

Which protocol is used to manage directory information in an NOS?. SMB. LDAP. CIFS. RPC.

What is a key step in NOS implementation?. Disabling network connections. Configuring user accounts and shares. Ignoring security updates. Removing backup systems.

How does an NOS support remote access?. By disabling external connections. Through VPNs with encryption. By limiting local access. By ignoring remote users.

Which NOS feature ensures consistent timestamps across devices?. NFS. NTP. SMC. RPC.

Which of the following best defines a distributed system?. A single computer running multiple processes. A network of independent computers that appear as a single coherent system. A multiprocessor system with shared memory. A cloud-based virutal machine.

Which of the following is an example of a stateless protocol ?. FTP. SMTP. HTTP. SSH.

What is the main goal of transparency in distributed systems?. Increase cost. Hide the complexity of distribution from users. Limit Communication. Enhance centralization.

In client-server communication , the client generally: Provides services. Requests services. Manages Authentication. Handles routing.

Process migration refer to : copying files between hosts. Moving a running process from one machine to another. Logging out of a session. Rescheduling Threads.

Which of the following is not a type of transparency in distributed systems ?. Location. Replication. Access. Monolithic.

RPC stands for : Remote Packet Communication. Real-time protocol control. Remote Procedure Call. Redundant Process Connection.

In messaging passing communication is typically : Shared-memory based. File-system based. Explicit send/receive operations. Permission-based only.

Stub generation in RPC is used to : Encrypt data. Hide network details from the programmer. Schedule threads. Handle deadlocks.

Stateless servers do not: Store client information between requests. Respond to multiple clients. Support communication. Use TCP/IP.

Which of the following protocols is commonly used for RPC transport ?. ARP. UDP. DNS. NTP.

In synchronous communication a process: Sends messages without waiting. Blocks until a response is received. Never receives messages. Ignores errors.

Token-based algorithms for mutual exclusion rely on: Timestamp ordering. Passing a special message between nodes. Shared variables. Central Coordinator.

The bully algorithm is used for. Encryption. Leader election. Load balancing. Caching.

Load balancing ensures: One process runs endlessly. A single node handles all requests. Tasks are distributed evenly across nodes. Files remain local.

A distributed file system (DFS) allows : only local processes to access files. Remote access to files as if they were local. Users to delete system files. Static file permissioning.

The two-phase commit protocol is primarily used for : Debugging. Distributed database transactions. File compression. Authentication.

Which component initiates a transaction in 2PC?. Cohort. Coordinator. Logger. Cache.

A major drawback of two-phase commit is: Too simple. Can block if coordinator fails. Doesn't support replication. Requires cloud hosting.

The three-phase commit protocol improves fault tolerance by : Eliminating logging. Adding an extra pre-commit phase. Using only one participant. Removing coordinators.

Checkpointing helps in : Restarting from previous safe states. Allocating memory. Load balancing. Message routing.

A distributed deadlock can be detected using: Token ring. Wait-for graph. DNS lookup. Ping messages.

Which of the following is not a benefit of replication?. Increased reliability. Faster access. automatic encryption. Load sharing.

in distributed scheduling preemptive policies allow: Jobs to stay forever. Tasks to migrate during execution. Only one user to run. Commands to be blocked.

Middleware in distributed systems acts as : Hardware connector. Communication layer between applications and network. Password manager. File defragmenter.

Which of the following is not a consistency model?. Strict. Sequential. Eventual. Fragmented.

Eventual consistency means: Data is always synchronized. Data becomes consistent over time. Data is never replicated. Only one node stores data.

In cloud-based distributed systems , virtualization is used to. Eliminate all security risks. Abstract physical resources. Disable OS. Remove caching.

Latency in distributed communication refers to: Total number of packets. Delay between sending and receiving messages. Disk usage. File permissions.

The CAP theorem states that a distributed system cannot simultaneously guarantee: Consistency , Availability , Partition tolerance. Speed , Encryption , Redundancy. CPU , Memory , Storage. Hot backup , Cold backup Failover.

Which of the following is a pull-based model?. Server broadcasts updates. Client requests data when needed. All nodes receive automatically. Files are globally locked.

Gossip protocols are commonly used for : Distributed failure detection. File encryption. Code compilation. CPU virtualization.

in peer-to-peer systems , nodes act as: Only clients. Only servers. Both clients and servers. Routers.

DNS is an example of: Centralized system. Hierarchical distributed system. Random access model. Non-replicated system.

Heartbeat messages are used for. Authentication. Failure detection. File sharing. Encryption.

A shared-nothing architecture means: All nodes share RAM. No node shares memory or disk. Only one node is active. Virtualization is disabled.

Cloud storage systems like Google Drive rely on: Manual copy-pasting. Distributed replication and synchronization. Local-only saving. Token rings.

in leader election, nodes must select. The weakest node. A node to coordinate tasks. A backup process only. A random participant.

A stateful server: Records previous client interactions. Ignores all past communication. Forgets all connections after use. Only responds to one client.

In distributed authentication, Kerberos is used to : Encrypt files manually. Authenticate users using secret keys. Schedule disk access. Organize file metadata.

Report abuse