All Coursera Quiz Answers

Course quiz: Introduction to computers and operating systems, and security Quiz Answers

In this article i am gone to share Course quiz: Introduction to computers and operating systems, and security Quiz Answers with you..

Enroll link: Introduction to Computers and Operating Systems and Security

Introduction to Computers and Operating Systems and Security Week 4 Quiz Answers


Also visit: Module quiz: Business systems applications Quiz Answers


 

Course quiz: Introduction to computers and operating systems, and security Quiz Answers

Question 1)
Which computing environment is identity and access management (IAM) most associated with?

  • On-premises commercial computing
  • Cloud-based commercial computing
  • Personal computing

Question 2)
What does the CRM in Microsoft CRM stand for?

  • Customer Relationship Marketing
  • Consumer Reliance Management
  • Customer Relationship Management

Question 3)
Which of the following is a benefit of Azure Managed Disks?

  • It enables sharing of files stored in the cloud.
  • It provides versatile storage options without the need for costly hardware like HDDs and SSDs.
  • It stores large, unstructured objects in containers.

Question 4)
Which of the following is a reason for storing data in a data lake?

  • Future unknown values may be found in the data.
  • It is ready for applying to analytics and extracting reports.
  • The structure and goal of the data is known and well defined.

Question 5)
Which of the following computing environments is likely to have the most hardware?

  • Commercial cloud computing
  • Commercial on-premises computing
  • Personal computing

Question 6)
True or False: Just-in-time (JIT) access is a policy of Zero Standing Access.

  • True
  • False

Question 7)
True or False: A company releases software that it believes to be safe from attack. Shortly after, a shortcoming is discovered and exploited to install ransomware on usersโ€™ devices. This is an example of a zero-day exploit.

  • True
  • False

Question 8)
Maintenance that occurs in response to failure is known as ____________ maintenance.

  • Corrective
  • Predictive
  • Routine

Question 9)
True or False: Patches add functionality to code.

  • True
  • False

Question 10)
_________ is when the information gained from data analysis is portrayed in a graphic format, such as a line graph or a bar chart.

  • Data visualization
  • Data storage
  • Data integration

Question 11)
Which of the following are elements of the threat landscape? Select all that apply.

  • The methods of attack used.
  • The potential vulnerabilities of an application.
  • The potential attackers who target vulnerabilities.
  • The impact of an attack.

Question 12)
Which of the following descriptions best defines ransomware?

  • Tricking a user to activate malicious code by clicking on it.
  • Preventing legitimate usersโ€™ access to their own files.
  • Automated and repetitive attacks on a system.

Question 13)
Why should you avoid using a single password across multiple accounts?

  • Some services allow for simpler, easier-to-remember passwords than others.
  • If an attacker obtains the password and associated email address, it can be used to access other accounts.
  • Itโ€™s easier to remember several short passwords than one long one.

Question 14)
True or False: Non-volatile memory is memory that will persist after the computer is turned off.

  • True
  • False

Question 15)
Which of the following can be used to take input?

  • Keyboard
  • Monitor
  • CPU

Question 16)
Which of the following definitions best describes a distributed operating system?

  • An OS that allows multiple users to work in tandem by compartmentalizing each userโ€™s actions and only allowing one user control at any given time.
  • An OS that connects several dispersed CPUs to execute tasks.
  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.

Question 17)
True or False: An operating system is a small piece of code that allows software and hardware to communicate.

  • True
  • False

Question 18)
True or False: iOS is used in mobile devices.

  • True
  • False

Question 19)
True or False: Linux is an example of open-source software.

  • True
  • False

Question 20)
Which of the following is a benefit of machine learning?

  • Machine learning models are well-suited for handling large amounts of data that would take great time and effort to analyze manually.
  • Machine learning models can automatically collect data to analyze.
  • Machine learning models and can detect and automatically correct errors in data.

Question 21)
Which of the following statements defines POP3?

  • A series of predetermined steps a computer uses to achieve a given task.
  • The procedures used to retrieve an email when it has arrived at the correct IP address.
  • A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.

Question 22)
Which of the following email clients uses OneDrive to provide additional cloud storage?

  • Outlook
  • Thunderbird
  • Gmail

Question 23)
Which of the following definitions best describes email spoofing?

  • An unsolicited email offering genuine products or services.
  • A fraudulent email from a supposedly known source like Amazon or the post office.
  • Attempting to hook people and trick them into revealing sensitive information about themselves.

Question 24)
A machine learning model can be trained to recognize elements that are unusual and indicate a potential issue, and trigger an action or alert in response. This describes _________.

  • Computer vision
  • Object detection
  • Anomaly detection

Question 25)
A machine learning model is given many images of a busy street, and eventually it is able to discern between cars, buses, and cyclists. This is an example of _________.

  • Knowledge mining
  • Anomaly detection
  • Object detection

Question 26)
Sam is using Microsoft Teams to host an important video meeting, and her computer is under heavy load. To ease the demand without reducing performance, how might the CPU respond?

  • The CPU will throttle down its clock speed.
  • The CPU will use multi-threading.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.

Question 27)
True or False: Storing data in a data warehouse is a more sophisticated process than storing data in a data lake.

  • True
  • False

Question 28)
Which of the following definitions best describes quarantining?

  • Keeping lists of domains and sites that are either allowed or not allowed through.
  • Monitoring the senderโ€™s profile and only allows reputable sources in.
  • Separating suspect emails for further analysis.

Question 29)
___________is software that helps a company to perform operations relating to the goal of making profit.

  • Hacking Software
  • Business Software
  • Proprietary Software

Question 30)
Business applications originate from___________.

  • Customer relationship management (CRM) systems
  • Line-of-business solutions (LOB)
  • Enterprise resource planning (ERP)

 


 

Question 31)
True or False: Identity and access management (IAM) is a cloud-based initiative to protect against hackers.

  • True
  • False

Question 32)
True or False: Microsoft CRM is built on Microsoftโ€™s Power Platform.

  • True
  • False

Question 33)
Which of the following is a massively scalable object store for text and binary data?

  • Azure Blob Storage
  • Azure Files
  • Azure Managed Disks

Question 34)
Select the most appropriate definition for Zero Standing Access.

  • Limiting a userโ€™s range of access.
  • Limiting a userโ€™s access time and scope.
  • Limiting the length of time in which a user can access a domain.

Question 35)
Which of the following statements accurately describe zero-day exploits? Select all that apply.

  • They include the use of ransomware.
  • They concern attacks that have been documented and patched.
  • They are done on previously unknown issues.

Question 36)
Which of the following descriptions best defines a Trojan attack?

  • Tricking a user to activate malicious code by clicking on it.
  • Preventing legitimate usersโ€™ access to their own files.
  • Automated and repetitive attacks on a system.

Question 37)
Assuming it is only used for one account, which of these passwords would be the most resistant against an attempted attack?

  • sandiego2016!
  • FjY123
  • HVh#8D!2f7$R

Question 38)
Which of the following are examples of desktop operating systems? Select all that apply.

  • Windows
  • MacOS
  • iOS

Question 39)
Which of these statements are true about machine learning? Select all that apply.

  • Machine learning models are guided by sets of rules called algorithms.
  • After training on a sufficient amount of data, a computer can make predictions about any new data that is added.
  • Machine learning models and can detect and automatically correct errors in data.

Question 40)
Which of the following statements defines Simple Mail Transfer Protocol (SMTP)?

  • A series of predetermined steps a computer uses to achieve a given task.
  • A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.
  • The procedures used to retrieve an email when it has arrived at the correct IP address.

Question 41)
True or False: Anomaly detection is a task that can be achieved by machine learning.

  • True
  • False

Question 42)
True or False: Object detection can be used to identify objects automatically from a picture.

  • True
  • False

Question 43)
Sam is running several applications on her laptop at once, and the temperature of the CPU has gotten quite high. How might the CPU respond to this?

  • The CPU will increase its clock speed.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
  • The CPU will throttle down its clock speed.

Question 44)
Which of the following characteristics suggests that a store is a data warehouse? Select all that apply.

  • Similarly structured data is grouped together.
  • Unordered, random data items.
  • The presence of an index.

Question 45)
True or False: Business software is software that is directly associated with the product the company makes.

  • True
  • False

Question 46)
True or False: Customer relationship management (CRM) systems predate Line-of-business solutions (LOB).

  • True
  • False

 

Question 47)
Microsoft Customer ______ Management (CRM) is built on Microsoftโ€™s Power Platform.

  • Reliance
  • Relevant
  • Relationship

Question 48)
Which of the following are reasons for storing data in a data warehouse? Select all that apply.

  • The data can act as a single source of truth.
  • It allows one to remove noise from data by filtering and cleaning data.
  • By storing all of the data, users can create different exploratory queries.

Question 49)
True or False: Cloud-based computing requires extensive hardware for a new business.

  • True
  • False

Question 50)
Allowing worker access to limited parts of your business is an example of a _____ policy.

  • Just-in-time (JIT) access
  • Just-enough-access (JEA)
  • 3-2-1 backup strategy

Question 51)
Which of the following best describes a zero-day exploit?

  • A flaw in a system was identified and closed with zero days left of danger.
  • Exploiting a vulnerability not known before the attack.
  • The day an exploit was launched.

Question 52)
Maintenance that is performed according to a preplanned schedule is known as ____________ maintenance.

  • Routine
  • Corrective
  • Predictive

Question 53)
Which of the following reasons might deter one from implementing a patch? Select all that apply.

  • It can fix an issue or flaw.
  • It can break the flow of concentration.
  • It can alter functionality.

Question 54)
_________ relates to combining data that comes from different sources into one common format.

  • Data integration
  • Data storage
  • Data analysis

Question 55)
Which of the following descriptions best define a botnet attack?

  • Automated and repetitive attacks on a system.
  • Preventing legitimate usersโ€™ access to their own files.
  • Tricking a user to activate malicious code by clicking on it.

Question 56)
True or False: Basing a password on a meaningful word, like a petโ€™s name, is safer than using easily-found information like a birthday.

  • True
  • False

Question 57)
A ____________ is a small piece of code that allows messages and instructions to pass between hardware and software components.

  • Operating system
  • Internet of things
  • Device Driver

Question 58)
Which of the following are examples of proprietary software? Select all that apply.

  • Windows
  • MacOS
  • Linux

Question 59)
Which of the following email clients uses Google Drive to provide additional cloud storage?

  • Gmail
  • Outlook
  • Thunderbird

Question 60)
Which of the following definitions best describes customer relationship management software?

  • Software that is designed exclusively to aid product development.
  • Software that facilitates communication between client and customer.
  • Software that is designed to help a company with payroll issues.

Question 61)
Commercial on-premises computing will require more ________ than personal or commercial cloud-based environments.

  • Software
  • Users
  • Hardware

Question 62)
Which of these outcomes can be accomplished with a patch? Select all that apply.

  • Removal of incompatibilities and flaws
  • Additional functionality
  • Mitigation of infection

Question 63)
_________ is the process of getting useful information out of raw data by observing relationships and patterns.

  • Data analysis
  • Data integration
  • Data visualization

 

Question 64)
True or False: A firewall can remove cyber intruders from your files.

  • True
  • False

Question 65)
Which of the following are examples volatile memory? Select all that apply.

  • Hard Disk Drive
  • RAM
  • Solid State Drive

Question 66)
Which of the following can be used for processing?

  • Keyboard
  • Monitor
  • CPU

Question 67)
Which of the following definitions best describes a time-sharing operating system?

  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
  • An OS that allows multiple users to work in tandem by compartmentalizing each userโ€™s actions and only allowing one user control at any given time.
  • An OS that connects several dispersed CPUs to execute tasks.

Question 68)
Which of the following is an example of a mobile operating system?

  • iOS
  • MacOS
  • Windows

Question 69)
______________ is/are an example of trying to elicit information from people by deceiving them.

  • Ads
  • Phishing
  • Email spoofing

Question 70)
Which of the following techniques can be used to detect fraud? Select all that apply.

  • Supervised Learning
  • Object detection
  • Machine Learning

Question 71)
______________ is the practice of isolating suspicious emails.

  • Filtering
  • Quarantining
  • Virus scanning

Question 72)
True or False: Azure Files is used for storing large objects.

  • True
  • False

Question 73)
Which of the following definitions best describes a batch operating system?

  • An OS that connects several dispersed CPUs to execute tasks.
  • An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
  • An OS that allows multiple users to work in tandem by compartmentalizing each userโ€™s actions and only allowing one user control at any given time.

Question 74)
True or False: Machine learning models are guided by sets of rules called algorithms.

  • True
  • False

Question 75)
True or False: Thunderbird is an email client that provides cloud storage as part of the service.

  • True
  • False

Question 76)
A data warehouse is like a data lake except that the information found there has been _____________, so it is easily acceptable.

  • Processed
  • Unindexed
  • Anonymized

Question 77)
Maintenance that is performed when signals suggest that an issue is likely to occur is known as ____________ maintenance.

  • Routine
  • Predictive
  • Corrective

Question 78)
At a physical storefront, you might place a security guard at the entrance to prevent intruders from getting in. For a web business, which of the following would you use to keep unwanted elements out of the system?

  • Spam filter
  • Anti-virus program
  • Firewall

Question 79)
Which of these statements are true about anomaly detection? Select all that apply.

  • It can only be used with images.
  • It can be used in such applications as financial fraud detection and finding indicators of impending engine trouble in a car.
  • It concerns the capability to automatically detect errors or unusual activity in a system.

Question 80)
How might a CPU respond when several applications are open at once, placing a heavy strain on resources? Select all that apply.

  • The CPU will use multi-threading.
  • The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
  • The CPU will throttle down its clock speed.

Question 81)
True or False: Data found in a data warehouse is more easily classified.

  • True
  • False

Question 82)
Which of the following are examples of non-volatile memory? Select all that apply:

  • Solid State Drive
  • Hard Disk Drive
  • RAM

Question 83)
Which of the following is an example of open-source software?

  • Linux
  • Windows
  • MacOS

Question 84)
True or False: Quarantining is an effective means of preventing hackers.

  • True
  • False

Question 85)
Which of the following definitions best describes business software?

  • Software that can be used to access a company discreetly.
  • Software that has a special license for use.
  • Software that addresses such needs as financial analysis and growth, customer management and analysis.

Question 86)
Which of the following can be used for output?

  • Keyboard
  • CPU
  • Monitor

Question 87)
True or False: Ads are a type of spam.

  • True
  • False

Question 88)
________ and Access Management (IAM) is a cloud-based security framework.

  • Identity
  • Interest
  • Individual

Question 89)
Which of the following definitions best describes a device driver?

  • An application that facilitates communication between user, hardware and software.
  • An application for taking in user input and executing the commands found in there.
  • A small piece of code that facilitates communication between hardware and software.