In this article, I’m simply sharing my thoughts and review of the Intro to Networking and Cloud Computing course along with all the quiz answers.
Just finished the Coursera course “Introduction to Networking and Cloud Computing”? You’re in the right place! In this post, I’m sharing a quick review of the course and providing all the quiz answers to help fellow learners progress with confidence.
Whether you’re exploring networking basics, learning about cloud services, or working toward the Microsoft Cybersecurity Analyst Professional Certificate, this course is a solid step forward — and I’ve got your back with the answers!
Table of Contents
Module quiz: Computer networking Quiz Answers
Question 1)
True or False: A PAN is used to cover entire countries.
- True
- False
Question 2)
Which of the following statements is true?
- A mesh network only has a single path
- A mesh network has multiple paths
- Data travels in one direction in a mesh network
Question 3)
True or False: The bus topology is less common today because older hubs on networks are being replaced with switches and routers.
- False
- True
Question 4)
True or False: A WLAN provides greater mobility, flexibility and has no security risks.
- True
- False
Question 5)
IPv4 uses decimal numbers for its addresses, what does IPv6 use for its addresses?
- Binary numbers
- Decimal numbers
- Hexadecimal
Question 6)
What does a subnet mask identify?
- A router
- Network and host sections of an IP address
- An IP address
Question 7)
What are some of the differences between IPv4 and IPv6? Select all that apply.
- IPv6 does not support Broadcast traffic
- IPv6 has built in security
- IPv6 does not support DHCP
- IPv6 addresses cannot be assigned manually.
Question 8)
It takes 4 steps to receive an IP address when using the _____ protocol.
- TCP
- DHCP
- IPv6
- IP
Question 9)
An IP default gateway identifies a ________ on a network?
- A network
- A router
- A printer
- A path
Question 10)
The subnet mask 255.0.0.0 is for what class of network?
- A
- C
- B
Question 11)
LANs and WLANs are used within buildings and homes, but what network type can cover entire countries?
- PAN
- WAN
- MAN
Question 12)
True or False: The Mesh topology is expensive to set up.
- True
- False
Question 13)
A _____topology is created when using a switch, which is replacing the ____ topology as hubs are being removed from networks.
- Bus, star
- Star, bus
- Bus, mesh
- Mesh, bus
Question 14)
True or False: A WLAN has a limited range and signal strength, and it also has security risks.
- True
- False
Question 15)
IPv4 uses decimal numbers and _________are used for IPv6.
- Binary numbers
- Hexadecimal
- Decimal numbers
Question 16)
A subnet mask is used to identify _______?
- A router
- Network and host sections of an IP address
- An IP address
Question 17)
DHCP can be used to obtain an IPv4 address, but how many steps does it take to receive the IP address?
- 5
- 4
- 6
- 2
Question 18)
True or False: An IP default gateway identifies a router on a network.
- True
- False
Question 19)
True or False: 255.0.0.0 is a subnet mask, for a class B network.
- False
- True
Question 20)
MANs are used across cities, but what network type can cover entire countries?
- PAN
- WAN
- MAN
Question 21)
The Mesh topology can be expensive to set up, but what is an advantage of this topology type?
- Data travels in one direction
- Multiple paths
- Single path
Question 22)
True or False: Hexadecimal numbers are used to address IPv4, and IPv6 uses decimals numbers
- True
- False
Question 23)
True or False: When obtaining an IPv4 address via DHCP it takes for 4 steps for an IP address to be assigned.
- True
- False
Question 24)
What does an IP default gateway identify?
- A router
- A network
- A path
- A printer
Module quiz: Network devices and protocols Quiz Answers
Question 1)
When joining networks and subnets, a _______ is used to connect the different network areas.
- Router
- Switch
- Firewall
Question 2)
The application layer in the TCP/IP suite brings together which three layers from the OSI model? Choose all that apply.
- Presentation
- Session
- Application
- Internet
Question 3)
True or False: When using a private and public cloud together, they form a hybrid cloud.
- True
- False
Question 4)
Virtual private network (VPN) technology can be used to connect to private and public clouds using _______ VPNs and site-to-site VPNs.
- Office
- User
- Remote
Question 5)
SMTP, IMAP, and POP3 are protocols used within what application?
- Remote connectivity application
- Web browsers
Question 6)
HTTPS uses which two protocols to encrypt web content traffic to prevent a man-in-the-middle attack?
- SSH
- TLS
- SSL
- FTPS
Question 7)
True or False: For secure web browsing port number 80 is used with HTTPS and for unsecured browsing port number 443 is used with HTTP.
- True
- False
Question 8)
True or False: DNS is critical to the use of the internet but DNS hijacking, spoofing and amplification are types of attacks that make it very vulnerable.
- True
- False
Question 9)
True or False: Traffic prioritization and marking packets are part of the quality of service (QOS) suite of network management mechanisms.
- True
- False
Question 10)
True or False: When searching through log files, using the Windows command prompt application and the findstr command helps to filter down what you are looking for.
- True
- False
Question 11)
What device is needed when joining different networks and subnets together?
- Switch
- Router
Firewall
Question 12)
What type of cloud setup do you have if you use your own private cloud as well as services from the public cloud?
- Cloud of clouds
- Hybrid cloud
- Cloud
- Multi-cloud
Question 13)
VPNs can be used to connect offices and home users to public and private cloud setups, but what are the two VPN types needed?
- Site-to-site
- VPN home
- Remote
- VPN client
Question 14)
True or False: HTTPS is the best protocol for a secure connection while surfing the web with your browser.
- True
- False
Question 15)
When using a web browser, the HTTP protocol uses port number 80 but what port number does HTTPS use?
- 22
- 8080
- 443
- 8000
Question 16)
Traffic management involves many different mechanisms that form part of which suite?
- Metric analysis
- Quality of service (QOS)
- Network availability
Question 17)
True or False: A switch is used to join different networks and subnets together.
- True
- False
Question 18)
Email can use which three protocols? Choose all that apply.
- POP3
- SMTP
- FTP
- IMAP
Question 19)
Port number ____ is used with HTTP and port number ____ is used with HTTPS when using a web browser.
- 22, 8000
- 443, 80
- 80, 443
- 8000, 22
Question 20)
DNS is a protocol critical to the use of the internet but because it’s widely used it’s vulnerable to what kind of attacks? Choose all that apply.
- DNS hijacking
- DNS amplification
- DNS spoofing
- DNS ghosting
Question 21)
Which of the following options are traffic management mechanisms from the quality of service (QOS) suite? Choose all that apply.
- Traffic prioritization
- Traffic Jitter
- Traffic latency
- Traffic marking
Question 22)
The hybrid cloud is made up of which cloud setup types? Choose all that apply.
- Private cloud
- Public cloud
- Multi-cloud
- Cloud of clouds
Question 23)
DNS is critical to the use of the internet but it’s vulnerable to attack. What type of attack overwhelms a target device with hundreds of DNS messages?
- DNS tunneling
- DNS Spoofing
- DNS hijacking
- DNS amplification
Question 24)
VPNs can be used to connect offices to public and private cloud setups, but what kind of VPN can be used to connect to the office network from home?
- Site-to-site
- Home
- Remote
Question 25)
True or False: The TCP/IP suite combines the OSI model’s application, presentation and session layers into one application layer.
- True
- False
Question 26)
True or False: SMTP, POP3, and SSH are all used within an email application.
- True
- False
Question 27)
When selecting protocols to use, it is best to choose a protocol that provides some level of encryption. Which protocol would be best for web page content delivery?
- HTTP
- FTPS
- HTTPS
- FTP
Module quiz: Network security Quiz Answers
Question 1)
Publish-subscribe is a type of client-server model where clients receive updates from the server on specific events. What other client-server models can you identify? Select all that apply.
- Request-query-subscribe model
- Publish-query model
- Request-response model
- Peer-to-peer model (P2P)
Question 2)
What components can be used to create rules within a firewall? Select all that apply.
- Direction
- Password
- Source IP address
- Protocol
Question 3)
True or False: Contemporary firewalls evolved from the very first type of firewall, the packet-filtering firewall.
- True
- False
Question 4)
A ____________ attack involves intercepting communication between two parties and relaying information between them so they are unaware of the attack.
- IP spoofing
- Eavesdropping
- Man-in-the-middle
- Backdoors
Question 5)
True or False: Change control is a great way to test and look for threats on the network.
- True
- False
Question 6)
What is network sniffing?
- Listening to the communication between two network devices
- Gaining unauthorized access to a network
- Spreading malware
- Cracking a password
Question 7)
What tier of authorization provides the lowest level of access?
- User access
- Administrator access
- Guest access
- Conditional access
Question 8)
Identify types of authorization protocols. Select all that apply.
- TLS
- TACACS+
- LDAP
- RADIUS
Question 9)
How many steps are involved in the DHCP IP address assignment process?
- 4
- 8
- 6
Question 10)
True or False: DHCP relay is used to forward DHCP requests blocked by routers on the network.
- True
- False
Question 11)
True or False: The publish-subscribe server model allows clients to send requests to the server to query its database.
- True
- False
Question 12)
True or False: Firewall rules are created using a list of usernames and passwords of who can access what service.
- True
- False
Question 13)
What firewalls have evolved from the very first type, the packet-filtering firewall? Select all that apply.
- Stateful firewall
- Stateless firewall
- Next-generation firewall
- Third-generation firewalls
Question 14)
True or False: A man-in-the-middle attack involves intercepting communication between two parties.
- True
- False
Question 15)
What steps are involved in the DHCP IP address assignment, and in what order? Select all that apply.
- The first two steps are DHCP discover, then DHCP offer
- The second two steps are DHCP discover, then DHCP offer
- The first two steps are DHCP request, then DHCP acknowledgement
- The second two steps are DHCP request and then DHCP acknowledgement
Question 16)
When a router is in the way of a DHCP request, a DHCP ____ is needed to forward the request to the DHCP server.
- Client
- Server
- Passer
- Relay
Question 17)
Different components, including source and destination IP addresses, protocols and ports are used to form firewall _______.
- Blockages
- Authorization
- Rules
- Access
Question 18)
Which of these are types of authorization protocols?
- RADIUS, LDAP, TACAC+
- LDAP, TLS, RADIUS
- LDAP, SSL, RADIUS
Question 19)
When a router is in the way of a DHCP request, what is needed to forward the request on behalf of the DHCP client?
- DHCP server
- DHCP passer
- DHCP relay
- DHCP client
Question 20)
Many firewalls that exist today are still based on the very first type that simply permitted or denied packets based upon a set of rules. What is this firewall called?
- Packet-filtering
- Stateful firewalls
- Proxy server firewalls
- Application-layer firewalls
Question 21)
True or False: Guest access is a high-level tier of authorization.
- True
- False
Question 22)
What two network analysis procedures can be used to identify threats and check for potential vulnerability?
- Change control
- Continuous monitoring
- Penetration testing
Question 23)
Guest access is the lowest authorization tier, but what other tiers have the highest authorization level to manage the system? Select all that apply.
- Superuser access
- User access
- Conditional access
- Administrator access
Question 24)
True or False: DHCP IP address assignment involves four steps: DHCP discover, offer, request, and acknowledgement.
- True
- False
Question 25)
What type of network attack involves an attacker intercepting communication between two parties who are unaware that someone else is listening because traffic seems to flow normally?
- Eavesdropping
- IP spoofing
- Man-in-the-middle
- Backdoors
Question 26)
What network analysis procedure involves testing users by sending fake or suspicious emails?
- Continuous monitoring
- Change control
- Penetration testing
Question 27)
True or False: Manipulating data packets to impersonate another device or user is known as spoofing.
- True
- False
Question 28)
True or False: RADIUS, TACACS and LDAP are all types of authorization protocols.
- True
- False
Module quiz: Cloud computing and networking Quiz Answers
Question 1)
Microsoft has its very own cloud platform called Azure, which includes Azure, virtual machine, storage, network, security services, and many more. What are the advantages of the Azure cloud platform? Select all that apply.
- Scalability
- Easy to manage
- Local access
- Worldwide access
Question 2)
Identify two disadvantages of cloud computing for large businesses.
- Scalability
- Cost
- Dependence on Internet connectivity
- Remote access
Question 3)
Within a virtual server environment, type 1 hypervisors run directly on the physical hardware, and they’re called bare metal. What is the type 2 hypervisor known as?
- Cloud
- Remote
- Hosted
Question 4)
What virtual machine type offers a higher ratio of CPU resources for high-performance computing requirements?
- Burstable
- Compute-optimized
- Memory optimized
Question 5)
What cloud capabilities can use intelligence to automate processes? Select all that apply.
- Artificial Intelligence (AI)
- Databases
- Servers
- Machine learning (ML)
Question 6)
What is the simplest type of AI that is designed to react to specific inputs and perform specific tasks?
- Reactive machines
- Narrow AI
- Limited memory AI
- General AI
Question 7)
Renting services or equipment and spreading cost throughout the year is known as what cost model?
- CapEx
- Top up
- OpEx
Question 8)
True or false: Microsoft provide many different XaaS solutions with products from Microsoft 365 and Microsoft Azure.
- True
- False
Question 9)
True or false: SaaS is deemed the most complete cloud offering, with the least amount of responsibility for the customer.
- True
- False
Question 10)
True or false: When implementing SaaS, bandwidth is critical to assure a business can use it.
- True
- False
Question 11)
When deciding how to create virtual machines, you must first decide what type of hypervisor you will use. What are the types? Select all that apply.
- Bare metal
- Cloud
- Remote
- Hosted
Question 12)
____________(a) is the simplest type of AI that is designed to react to specific inputs and perform specific tasks and ___________(b) is theoretical type of AI in that could be capable of learning, reasoning and problem solving in the future?
- (a) Reactive machines, (b) General AI
- (a) Narrow AI, (b) Theory of mind AI
- (a) General AI, (b) Reactive machines
- (a) Narrow AI, (b) General AI
Question 13)
True or false: When purchasing hardware or services you can choose to pay everything upfront which is known as OpEx, or spread the cost over a period of time, known as CapEx.
- True
- False
Question 14)
True or false: Microsoft provide many different XaaS solutions with products from Microsoft 365 and Microsoft Azure.
- True
- False
Question 15)
What model of XaaS gives the customer the most responsibility and control when using cloud services?
- PaaS
- NaaS
- IaaS
Question 16)
Azure, Microsoft’s cloud platform, offers many different services. Identify three of them.
- Azure Storage services
- Azure Virtual Machines services
- Azure Printing services
- Azure Security services
Question 17)
What virtual machine type is best-suited to real-time big data processing and data analytics?
- Memory-optimized
- General purpose
- Compute-optimized
Question 18)
What cloud capability can perform tasks that would typically require human intelligence?
- Servers
- Artificial Intelligence (AI)
- Machine learning (ML)
Question 19)
True or false: Reactive machines is the simplest type of AI that is designed to react to specific inputs and perform specific tasks.
- True
- False
Question 20)
Microsoft can provide many different XaaS solutions. Which Microsoft products are classified as IaaS, PaaS or SaaS? Select all that apply.
- Microsoft Azure is PaaS, IaaS or SaaS
- Microsoft 365 is SaaS
- Microsoft Teams is SaaS
- Microsoft 365 is PaaS
Question 21)
What type of XaaS gives the customer everything they need to develop software or applications straight away?
- PaaS
- NaaS
IaaS
Question 22)
When implementing SaaS, it is critical for a business to consider if its internet bandwidth allow the SaaS solution to run optimally and allow enough users to access it. What other factors should be considered? Select all that apply.
- Server hardware
- Training
- Support
- Operating systems
Question 23)
True or false: Microsoft has its very own cloud platform called Azure, with several services, including virtual machines, storage, network, security services, and many more.
- True
- False
Question 24)
What cloud capability can learn from data by identifying patterns within that data to determine trends?
- Servers
- Artificial Intelligence (AI)
- Machine learning (ML)
Question 25)
Identify two advantages of cloud computing for large businesses.
- Improved collaboration
- You control all the security around the hardware
- Easy to setup
- Disaster recovery
Question 26)
What virtual machine type is better suited to VMs that will have variable or occasional spikes in demand?
- GPU-optimized
- Compute-optimized
- Burstable
Question 27)
When purchasing hardware or services a business can choose to pay everything upfront or spread the cost over a period of time. What cost models explain these methods of expenditure? Select all that apply.
- Capex
- Top up
- Opex
- Loan
Question 28)
Microsoft 365 provides a suite of applications. What type of XaaS is it?
- PaaS
- SaaS
- IaaS
- NaaS
Question 29)
True or false: For large businesses using the cloud is always cost-effective.
- True
- False
Self-review: Digital transformation Quiz Answers
Overview
Question 1)
Did you find a SaaS solution to automate the accounting functions for Sam’s Scoops?
- Yes
- No
Question 2)
Did you find a SaaS solution to allow Sam’s Scoops to better communicate with their suppliers and hold meetings?
- Yes
- No
Question 3)
Did you find a SaaS solution for a website that will promote Sam’s Scoops but can also be developed further to support online sales?
- No
- Yes
Question 4)
Which of the following statements best describes Software as a Service (SaaS)?
- SaaS refers to the delivery of software applications over the internet.
- SaaS refers to the installation of software applications on individual computers
- SaaS refers to the delivery of software applications over a local network.
- SaaS refers to the use of software applications without an internet connection.
Question 5)
Did you suggest cloud technology from Microsoft Azure that could benefit Sam’s Scoops?
- Yes
- No
Question 6)
You are a small business owner considering migrating your on-premises infrastructure to the cloud. Which of the following benefits would likely be relevant to your decision? Select all that apply.
- Improved scalability.
- Cost savings.
- Greater control over hardware.
- Increased physical security.
Question 7)
Did you suggest network technology that will improve the security of Sam’s Scoops network?
- Yes
- No
Question 8)
Which of the following network technologies provides an additional layer of security by inspecting and filtering incoming network traffic based on predefined rulesets?
- Switch
- Router
- Firewall
Question 9)
Did you produce a network diagram that displays new cloud services and any security device(s) that you have suggested?
- Yes
- No
Question 10)
Which of the following benefits can be derived from using a network diagram? Select all that apply.
- Enhancing network performance.
- Identifying potential single points of failure.
- Automating network management tasks.
Course quiz: Introduction to Networking and Cloud Computing Quiz Answers
Question 1)
True or False: The internet is considered to be a large MAN.
- True
- False
Question 2)
What protocol uses subnet masks and default gateways to address and enable devices to communicate across a network and the internet?
- DNS
- IP
- UDP
- TCP
Question 3)
A logical and a physical star topology is created when connecting multiple devices with a ______.
- Firewall
- Switch
- Server
- Hub
Question 4)
True or False: IPv4 addresses are 128 bits long and IPv6 addresses are 32 bits long.
- True
- False
Question 5)
When using a Windows PC, what do you need to type in the command application to get the device’s IP address?
- netstat -a
- ipconfig
- ipaddress
Question 6)
What is the topology used in this logical network diagram?
- Mesh
- Ring
- Bus
- Star
Question 7)
In a small hybrid network, a wireless router can also often act as a what?
- Hub
- Server
- Firewall
Question 8)
An on-premise setup is when a data center is owned and used by one company inside the same building as the users. But what cloud type would this be classified as?
- Private cloud
- Multi-cloud
- Public cloud
- Hybrid cloud
Question 9)
When a data center is owned and used by one company it’s known as a private cloud setup. What is it called if the users are also on the same site?
- Multi-cloud
- On-premise
- Hybrid cloud
Question 10)
True or False: An IoT device needs little or no human interaction or intervention, but it needs a way to communicate over the internet to use back-end services provided by the cloud.
- True
- False
Question 11)
Which layers are missing from this diagram of the OSI model? Select all that apply.
- Network access layer
- Internet layer
- Presentation layer
- Data link layer
Question 12)
True or false: The network access layer from the TCP/IP suite combines the network and physical layers of the OSI model.
- True
- False
Question 13)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops and both operate at the network access layer of the TCP/IP suite.
- True
- False
Question 14)
Which port number range do the most common protocols like HTTP, HTTPS and DNS use?
- 0 -1023
- 1024- 49151
- 49152 – 65565
Question 15)
What information can you get with the netstat -a command on a Windows PC and an Apple Mac? Select all that apply.
- Protocols used in open sessions
- Amount of data sent in open sessions
- Used devices
- Current open sessions
Question 16)
A DNS server translates domain names to IP addresses. To do this it needs to look up a website name and its respective IP address in a ______.
- Lookup record
- Request record
- SRV record
- Record
Question 17)
What information can you find in a typical log file? Select all that apply.
- Event description
- Username
- Timestamp
- Password
Question 18)
VPN, SSH, and RDP are all types of remote access protocols, that can be used to gain access to different devices but ____ can give remote users access to a whole network whilst also encrypting traffic.
- SSH
- RDP
- VPN
Question 19)
Steps 1 and 3 of the DHCP process have been left out on the diagram below. What are these steps? Select all that apply.
- Step 1: DHCP Discover
- Step 3: DHCP Reply
- Step 3: DHCP Request
- Step 1: DHCP SYN
Question 20)
True or false: Fingerprint scanners and facial recognition are examples of multi-factor authentication.
- True
- False
Question 21)
To create a strong password, it is recommended to use at least 8 characters. What are other recommendations for strong passwords? Select all that apply.
- Use special characters and symbols.
- Use uppercase and lowercase letters.
- Use more than one phrase.
Question 22)
There are security risks when connecting to a private network via a public wireless network. How does a VPN reduce the risk of attackers eavesdropping on the connection?
- The VPN connection encrypts the traffic.
- The VPN only allows you to connect to secure networks.
- The VPN sets up a password between your device and the public Wi-Fi.
Question 23)
Identify two advantages of cloud computing.
- Complete control
- Compatibility
- Remote access
- Scalability
Question 24)
What Azure service includes Power BI, Azure Data Lake and Azure Machine Learning?
- Azure Analytics
- Azure Insights
- Azure Bot
Question 25)
AI and machine learning can be used to make decisions based on patterns identified, but how can they help with business processes?
- Create business processes
- Identify business processes
- Automate business processes
Question 26)
Which three main capabilities in Microsoft Azure enable developers to quickly create and deploy applications? Select all that apply.
- Mobile apps
- API apps
- Web apps
- Messaging apps
Question 27)
Which XaaS service supports developers to develop straight away without needing to set up an operating system?
- IaaS
SaaS- PaaS
Question 28)
Microsoft 365 is an example of a____(a) which provides many different applications straight to the end user. This combination of applications is known as a _____(b).
- (a) SaaS, (b) Suite
- (a) Suite, (b) SaaS
- (a) Application, (b) PaaS
- (a) PaaS, (b) application
Question 29)
The shared responsibility model determines who takes responsibility for different parts of the different XaaS, between the ______ and the _____. Select all that apply.
- Cloud provider
- Network administrator
- Customer
- Internet service provider
Question 30)
What firewall type is desirable because it combines firewall functions and can perform deep packet inspection?
- Next-generation firewall
- Application-layer firewalls
- Stateful firewalls
- Packet filtering firewalls
Question 31)
What network type would you associate with the internet?
- MAN
- WAN
- LAN
- PAN
Question 32)
The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another. The address versions used are either _____ or _____. Choose all that apply.
- IPv6
- Ipv3
- IPv5
- IPv4
Question 33)
When a switch is used to connect multiple devices together it creates a _____ and _____ star topology. Select all that apply.
- Logical
- Mesh
- Bus
- Physical
Question 34)
IPv4 is only 32 bits long providing over 4 billion addresses. But because the available IPv4 addresses have been exhausted Ipv6 was introduced. How many bits are used to make up IPv6 addresses?
- 64
- 48
- 128
Question 35)
True or False: Wireless routers are used in many homes around the world, providing network interconnectivity, wireless connectivity and firewall services.
- True
- False
Question 36)
What three components are needed to make up an IoT (Internet of Things) device? Select all that apply.
- Device or sensor
- Back-end services
- Communication capability
- Local storage
Question 37)
Which layer in the TCP/IP suite performs the same function as the data link and physical layers of the OSI model?
- Internet layer
- Transport layer
- Network access layer
- Application layer
Question 38)
Which two network access layer protocols from the TCP/IP suite are being used on this network from Sam’s Scoops?
Network diagram
- Cellular
- Satellite
- Ethernet
- Wi-Fi
Question 39)
Which common protocols use the port range numbers 0 – 1023? Select all that apply.
- HTTP
- DNS
- HTTPS
- SIP
Question 40)
True or false: The netstat -a command can be used on both a Windows PC and an Apple Mac to identify sessions and protocols in use on that device.
- True
- False
Question 41)
True or false: Log files are records of events committed to a file in a list format. They can include different types of information about events that happened at a particular time.
- True
- False
Question 42)
VPN, RDP and SSH are all classified as what type of protocol?
- Messaging
- Internet
- Network management
- Remote access
Question 43)
Fingerprint scanners and facial recognition technology are examples of what type of authentication method?
- Password-based
- Certificate-based
- Biometric
- Multi-factor
Question 44)
True or false: A strong password should be at least 8 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters or symbols. Passwords should also be changed regularly.
- True
- False
Question 45)
You can become a target for cyberattacks when you use a public wireless network. How can you mitigate this potential threat?
- Change your passwords every time after you use a public network.
- Keep changing the Wi-Fi network you are connected to.
- Use passwords with special characters and symbols.
- Use a VPN connection.
Question 46)
Cloud computing offers scalability and remote access. Another benefit is that it is cost-effective because it uses a __________ pricing model.
- Pay in full
- Fixed
- Pay-as-you-go
Question 47)
_____________ is a suite of tools that includes Power BI, Azure Data Lake, and Azure Machine Learning. This suite can collect and analyze customer data, and businesses use it to better understand customer needs and preferences.
- Azure Insights
- Azure Analytics
- Azure Bot
Question 48)
_____ benefits from PaaS because they do not need to worry about the infrastructure or operating system setup and can start working on applications straight away.
- End users
- Network engineers
- Developers
Question 49)
Microsoft 365 is a suite of applications. Which XaaS does it best represent?
- SaaS
- IaaS
- PaaS
Question 50)
Which XaaS gives the cloud provider more responsibility than the user in the shared responsibility model?
- NaaS
- IaaS
- SaaS
- PaaS
Question 51)
Next-generation firewalls perform many of the same functions as stateful firewalls but include additional functions from other types of firewalls. What are these functions? Select all that apply.
- Deep packet inspection
- Packet-filtering
- VPN support
- RDP support
Question 52)
True or False: The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another.
- True
- False
Question 53)
What is the topology used in this logical network diagram?
- Bus
- Star
- Ring
- Mesh
Question 54)
When building a hybrid network, what device can be used to both interconnect different networks and provide wireless connectivity?
- A wireless router
- A switch
- A firewall
- A modem
Question 55)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops, but what layer of the TCP/IP suite do they operate at?
- Transport
- Physical layer
- Application
- Network access layer
Question 56)
True or false: The SIP protocol comes from the well-known port number range between 0 and 1023.
- True
- False
Question 57)
To create a strong password, what is the minimum number of characters that you’re recommended to use?
- 5
- 10
- 8
- 6
Question 58)
True or false: When using a public wireless network to connect to a secured network like a business network, you can mitigate security threats by changing your passwords every time after you use a public wireless network.
- True
- False
Question 59)
Azure Analytics is a suite made up of which three tools? Select all that apply.
- Azure Machine Learning
- Azure Data Lake
- Azure Insights
- Power BI
Question 60)
App services within Microsoft Azure provide three main capabilities, web apps, mobile apps, and API apps. These services are typically used by developers.
- False
- True
Question 61)
True or false: The SaaS service is the best way for a developer to get started straight away without needing to set up an operating system.
- True
- False
Question 62)
True or false: Proxy server firewalls perform many of the same functions as stateful firewalls but they also have additional functions such as packet filtering and VPN support.
- True
- False
Question 63)
When a switch is used to connect multiple devices together it creates the same physical and logical topology which is the _________ topology?
- Bus
- Ring
- Mesh
- Star
Question 64)
What kind of device or sensor operates with little or no human interaction or intervention and communicates via the internet to use back-end services provided by the cloud?
- IoT
- Laptop
- Printer
- Router
Question 65)
Which layers are missing from this diagram of the OSI model? Select all that apply.
Diagram of the OSI model with the titles of layers 3 and 4 masked out.
- Network layer
- Internet layer
- Transport layer
- Network access layer
Question 66)
Which two layers in the OSI model perform the same functions as the network access layer in the TCP/IP suite? Select all that apply.
- Data link layer
- Transport layer
- Physical layer
- Application layer
Question 67)
True or false: A DNS server translates website names to IP addresses and stores different information in the form of records.
- True
- False
Question 68)
Which file format includes a timestamp, event description, username, and other information, and is used to store event records in a list format?
- Security file
- Log file
- Event file
Question 69)
Remote access technologies can help increase productivity and help save costs for a business. What protocols enable remote access? Select all that apply.
- RDP
- SSH
- SMTP
- VPN
Question 70)
AI and machine learning can be used to automate processes and make decisions based on patterns identified.
- False
- True
Question 71)
App services within Microsoft Azure provide three main capabilities web apps, mobile apps, and API apps but whom are these services intended to help?
- Network engineer
- Developers
- End users
Question 72)
Which Microsoft SaaS provides a suite of applications?
- Microsoft Teams
- Microsoft 365
- Microsoft Word
Question 73)
IPv4 is ____(a) bits long providing over 4 billion addresses, which have now been exhausted. IPv6 is its replacement and uses ___(b) bits, doubling the number of addresses for every additional bit used.
- (a) 64, (b) 128
- (a) 16, (b) 32
- (a) 32, (b) 128
Question 74)
A DNS server translates website names to IP addresses but what type of record stores details of the services supported by that domain?
- A record
- SRV record
- Request record
- Lookup record
Question 75)
What process is demonstrated by the diagram below?
DHCP IP assignment process
- IP address to name translation
- Dynamic IP address assignment
- Static IP address assignment
- Name to IP address translation
Question 76)
Identify two disadvantages of cloud computing.
- Limited control
- Compatibility issues
- Full control
Question 77)
What is the model used to identify the responsible party for managing various XaaS components between the cloud provider and the customer?
- Management model
- Management responsibility model
- Responsible model
- Shared responsibility model
Question 78)
The internet is the biggest ___, allowing for communication across the world.
- LAN
- MAN
- WAN
- PAN
Question 79)
True or False: On a Windows PC you use the ipconfig command to find the IP address, but on an Apple Mac you use the ipconfig getifaddr en0 command.
- True
- False
Question 80)
When a data center is owned and used by one company it is referred to as a ___________(a). If this cloud setup is also on the same site as the users it’s _________(b).
- (a) Private cloud, (b) Off-premise
- (a) Private cloud, (b) On-premise
- (a) Public cloud, (b) On-premise
You might also like: Intro to Computers and OS Security Quiz Answers + Review
My Review: Intro to Networking and Cloud Computing
I recently completed a course focused on Networking and Cloud Computing, which is part of the Microsoft Cybersecurity Analyst Professional Certificate series on Coursera. This course is designed as a beginner-friendly introduction to key concepts in networking and cloud environments — and it absolutely delivers on that promise. Spread across five modules, the course covers fundamental topics like network infrastructure, monitoring, network security, cloud computing basics, virtual machines, and cloud services.
It’s especially useful for those preparing for the Microsoft SC-900 exam, which can lead to the Security, Compliance, and Identity Fundamentals Certification. I found the explanations to be clear and accessible, even for those with no prior IT experience. The course strikes a great balance between technical depth and simplicity, making it an ideal stepping stone for anyone looking to build a foundation in cybersecurity and cloud systems. Overall, it’s a valuable addition to any beginner’s learning path in tech.