Quiz

What is infrastructure in a box?

Take this infrastructure in a box quiz to test your knowledge of the central concepts. Write down your answers and then scroll down to see how well you did.

1. In general, systems management consists of practices and processes that optimize the use of information technology (IT) resources in an enterprise. What twist on systems management makes it possible to, among other things, access multiple computers from a single central console and monitor resource performance in two or more different OSs at the same time?

2. Which of the following is not an aspect of change management?
a. preventing change
b. adapting to change
c. effecting change
d. controlling change
e. All of the above are aspects of change management.

3. LOM makes it possible for a system administrator to monitor and manage servers by remote control. A complete LOM system consists of a hardware component called the LOM module and a program that facilitates the continuous monitoring of variables such as microprocessor temperature and utilization. What does LOM stand for?

4. CM is the detailed recording and updating of information that describes an enterprise's computer systems and networks, including all hardware and software components. In this context, what does CM stand for?
a. customization management
b. component management
c. configuration management
d. change management

5. Your company has legacy applications and databases and wants to continue to use them while adding or migrating to a new set of applications that exploit the Internet, e-commerce, extranet, and other technologies. Would you turn to EAI or to ERP?

6. In the typical distributed computing transaction, user interface processing is done in the PC at the user's location and business processing is done in a remote computer. Where does database access and processing typically occur?
a. In the user PC
b. In the same PC as the business processing
c. In a third computer
d. Both B and C

7. This quality describes a computer system or component designed so that, in the event that a component fails, a backup component or procedure can immediately take its place with no loss of service. What is it?

8. ____________-based management of a multi-user workstation typically includes setting individual operating rules for such things as access to files or applications, various levels of access (such as "read-only" permission, or permission to update or delete files), the appearance and makeup of individual users' desktops, and so on.

9. UTM refers to a comprehensive security product that typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. What does UTM stand for?

10. Which of the following is NOT a part of systems management?
a. gathering requirements
b. purchasing software and hardware
c. distributing software and hardware to their destinations
d. training users
e. maintaining software and hardware





Check your score

1. In general, systems management consists of practices and processes that optimize the use of information technology (IT) resources in an enterprise. What twist on systems management makes it possible to, among other things, access multiple computers from a single central console and monitor resource performance in two or more different OSs at the same time?
Answer: virtual systems management
.

Here's a more complete list of the advantages of VSM:

  • Access to multiple computers from a single central console
  • Decentralization of project groups
  • Ability to move workloads, maximizing productivity
  • Ease of adding or removing system resources
  • User-friendly interface that shows the relationships among existing resources
  • Ability to monitor resource performance in two or more different OSs concurrently
  • Management of OS functions without disrupting performance of the OS or applications
  • Proactive system administration
  • Improved system stability
  • Enhanced data integrity
  • Standardization of support requirements and procedures.

2. Which of the following is not an aspect of change management?
Answer: a. preventing change

Change is inevitable. As in the laws of evolution, we all have to adapt or perish. Nevertheless, change management can help your organization maximize any benefit and control any damage that is part of the package.

3. LOM makes it possible for a system administrator to monitor and manage servers by remote control. A complete LOM system consists of a hardware component called the LOM module and a program that facilitates the continuous monitoring of variables such as microprocessor temperature and utilization. What does LOM stand for?
Answer: LOM stands for lights-out management.

The program also allows for such remote operations as rebooting, shutdown, troubleshooting, alarm setting, fan-speed control, and operating system reinstallation.

4. CM is the detailed recording and updating of information that describes an enterprise's computer systems and networks, including all hardware and software components. In this context, what does CM stand for?
Answer: c. configuration management

Information recorded for configuration management typically includes the versions and updates that have been applied to installed software packages and the locations and network addresses of hardware devices.

5. Your company has legacy applications and databases and wants to continue to use them while adding or migrating to a new set of applications that exploit the Internet, e-commerce, extranet, and other technologies. Would you turn to EAI or to ERP?
Answer: EAI (enterprise application integration) is what you're looking for.

EAI comprises the plans, methods, and tools aimed at modernizing, consolidating, and coordinating the computer applications in an enterprise. EAI may involve developing a new total view of an enterprise's business and its applications, seeing how existing applications fit into the new view, and then devising ways to efficiently reuse what already exists while adding new applications and data.

6. In the typical distributed computing transaction, user interface processing is done in the PC at the user's location and business processing is done in a remote computer. Where does database access and processing typically occur?
Answer: c. In a third computer

In the typical distributed computing transaction using the 3-tier model, user interface processing is done in the PC at the user's location, business processing is done in a remote computer and database access and processing is done in another computer that provides centralized access for many business processes. Typically, this kind of distributed computing uses the client/server communications model.

7. This quality describes a computer system or component designed so that, in the event that a component fails, a backup component or procedure can immediately take its place with no loss of service. What is it?
Answer: fault tolerance

Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination. In the software implementation, the operating system provides an interface that allows a programmer to "checkpoint" critical data at pre-determined points within a transaction. In the hardware implementation (for example, with Stratus and its VOS operating system), the programmer does not need to be aware of the fault-tolerant capablilities of the machine.

8. ____________-based management of a multi-user workstation typically includes setting individual operating rules for such things as access to files or applications, various levels of access (such as "read-only" permission, or permission to update or delete files), the appearance and makeup of individual users' desktops, and so on.
Answer: policy-based management

Specific user settings are activated when that person logs in to the computer. There are a number of software packages available to automate some elements of policy-based management. In general, the way these work is as follows: business policies are input to the products, and the software communicates to network hardware how to support those policies.

9. UTM refers to a comprehensive security product that typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. What does UTM stand for?
Answer: unified threat management

The principal advantages of UTM are simplicity, streamlined installation and use, and the ability to update all the security functions or programs concurrently.

10. Which of the following is NOT a part of systems management?
Answer: d. training users

Systems management is the management of the information technology systems in an enterprise. This includes gathering requirements, purchasing equipment and software, distributing it to where it is to be used, configuring it, maintaining it with enhancement and service updates, setting up problem-handling processes, and determining whether objectives are being met.

This was first published in August 2010

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: