All Coursera Quiz Answers

Course quiz: Introduction to Networking and Cloud Computing Quiz Answers

In this article i am gone to share Coursera Course: Introduction to Networking and Cloud Computing Week 5 | Course quiz: Introduction to Networking and Cloud Computing Quiz Answers with you..

Enrol Link:  Introduction to Networking and Cloud Computing

 

Course quiz: Introduction to Networking and Cloud Computing Quiz Answers

Question 1)
True or False: The internet is considered to be a large MAN.

  • True
  • False

Question 2)
What protocol uses subnet masks and default gateways to address and enable devices to communicate across a network and the internet?

  • DNS
  • IP
  • UDP
  • TCP

Question 3)
A logical and a physical star topology is created when connecting multiple devices with a ______.

  • Firewall
  • Switch
  • Server
  • Hub

Question 4)
True or False: IPv4 addresses are 128 bits long and IPv6 addresses are 32 bits long.

  • True
  • False

Question 5)
When using a Windows PC, what do you need to type in the command application to get the device’s IP address?

  • netstat -a
  • ipconfig
  • ipaddress

Question 6)

Logical network diagram

What is the topology used in this logical network diagram?

  • Mesh
  • Ring
  • Bus
  • Star

Question 7)
In a small hybrid network, a wireless router can also often act as a what?

  • Hub
  • Server
  • Firewall

Question 8)
An on-premise setup is when a data center is owned and used by one company inside the same building as the users. But what cloud type would this be classified as?

  • Private cloud
  • Multi-cloud
  • Public cloud
  • Hybrid cloud

Question 9)
When a data center is owned and used by one company it’s known as a private cloud setup. What is it called if the users are also on the same site?

  • Multi-cloud
  • On-premise
  • Hybrid cloud

Question 10)
True or False: An IoT device needs little or no human interaction or intervention, but it needs a way to communicate over the internet to use back-end services provided by the cloud.

  • True
  • False

Question 11)
Which layers are missing from this diagram of the OSI model? Select all that apply.

Diagram of the OSI model with layers 2 and 6 masked out.

 

  • Network access layer
  • Internet layer
  • Presentation layer
  • Data link layer

Question 12)
True or false: The network access layer from the TCP/IP suite combines the network and physical layers of the OSI model.

TCP/IP suite combines

  • True
  • False

Question 13)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops and both operate at the network access layer of the TCP/IP suite.

  • True
  • False

Question 14)
Which port number range do the most common protocols like HTTP, HTTPS and DNS use?

  • 0 -1023
  • 1024- 49151
  • 49152 – 65565

Question 15)
What information can you get with the netstat -a command on a Windows PC and an Apple Mac? Select all that apply.

  • Protocols used in open sessions
  • Amount of data sent in open sessions
  • Used devices
  • Current open sessions

Question 16)
A DNS server translates domain names to IP addresses. To do this it needs to look up a website name and its respective IP address in a ______.

  • Lookup record
  • Request record
  • SRV record
  • Record

Question 17)
What information can you find in a typical log file? Select all that apply.

  • Event description
  • Username
  • Timestamp
  • Password

Question 18)
VPN, SSH, and RDP are all types of remote access protocols, that can be used to gain access to different devices but ____ can give remote users access to a whole network whilst also encrypting traffic.

  • SSH
  • RDP
  • VPN

Question 19)
Steps 1 and 3 of the DHCP process have been left out on the diagram below. What are these steps? Select all that apply.

Diagram of the DHCP process with the titles of step 1 and 3 masked out

 

  • Step 1: DHCP Discover
  • Step 3: DHCP Reply
  • Step 3: DHCP Request
  • Step 1: DHCP SYN

Question 20)
True or false: Fingerprint scanners and facial recognition are examples of multi-factor authentication.

  • True
  • False

Question 21)
To create a strong password, it is recommended to use at least 8 characters. What are other recommendations for strong passwords? Select all that apply.

  • Use special characters and symbols.
  • Use uppercase and lowercase letters.
  • Use more than one phrase.

Question 22)
There are security risks when connecting to a private network via a public wireless network. How does a VPN reduce the risk of attackers eavesdropping on the connection?

  • The VPN connection encrypts the traffic.
  • The VPN only allows you to connect to secure networks.
  • The VPN sets up a password between your device and the public Wi-Fi.

Question 23)
Identify two advantages of cloud computing.

  • Complete control
  • Compatibility
  • Remote access
  • Scalability

Question 24)
What Azure service includes Power BI, Azure Data Lake and Azure Machine Learning?

  • Azure Analytics
  • Azure Insights
  • Azure Bot

Question 25)
AI and machine learning can be used to make decisions based on patterns identified, but how can they help with business processes?

  • Create business processes
  • Identify business processes
  • Automate business processes

Question 26)
Which three main capabilities in Microsoft Azure enable developers to quickly create and deploy applications? Select all that apply.

  • Mobile apps
  • API apps
  • Web apps
  • Messaging apps

Question 27)
Which XaaS service supports developers to develop straight away without needing to set up an operating system?

  • IaaS
  • SaaS
  • PaaS

Question 28)
Microsoft 365 is an example of a____(a) which provides many different applications straight to the end user. This combination of applications is known as a _____(b).

  • (a) SaaS, (b) Suite
  • (a) Suite, (b) SaaS
  • (a) Application, (b) PaaS
  • (a) PaaS, (b) application

Question 29)
The shared responsibility model determines who takes responsibility for different parts of the different XaaS, between the ______ and the _____. Select all that apply.

  • Cloud provider
  • Network administrator
  • Customer
  • Internet service provider

Question 30)
What firewall type is desirable because it combines firewall functions and can perform deep packet inspection?

  • Next-generation firewall
  • Application-layer firewalls
  • Stateful firewalls
  • Packet filtering firewalls

 


 

Question 31)
What network type would you associate with the internet?

  • MAN
  • WAN
  • LAN
  • PAN

Question 32)
The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another. The address versions used are either _____ or _____. Choose all that apply.

  • IPv6
  • Ipv3
  • IPv5
  • IPv4

Question 33)
When a switch is used to connect multiple devices together it creates a _____ and _____ star topology. Select all that apply.

  • Logical
  • Mesh
  • Bus
  • Physical

Question 34)
IPv4 is only 32 bits long providing over 4 billion addresses. But because the available IPv4 addresses have been exhausted Ipv6 was introduced. How many bits are used to make up IPv6 addresses?

  • 64
  • 48
  • 128

Question 35)
True or False: Wireless routers are used in many homes around the world, providing network interconnectivity, wireless connectivity and firewall services.

  • True
  • False

Question 36)
What three components are needed to make up an IoT (Internet of Things) device? Select all that apply.

  • Device or sensor
  • Back-end services
  • Communication capability
  • Local storage

Question 37)
Which layer in the TCP/IP suite performs the same function as the data link and physical layers of the OSI model?

  • Internet layer
  • Transport layer
  • Network access layer
  • Application layer

Question 38)
Which two network access layer protocols from the TCP/IP suite are being used on this network from Sam’s Scoops?

Network diagram

  • Cellular
  • Satellite
  • Ethernet
  • Wi-Fi

Question 39)
Which common protocols use the port range numbers 0 – 1023? Select all that apply.

  • HTTP
  • DNS
  • HTTPS
  • SIP

Question 40)
True or false: The netstat -a command can be used on both a Windows PC and an Apple Mac to identify sessions and protocols in use on that device.

  • True
  • False

Question 41)
True or false: Log files are records of events committed to a file in a list format. They can include different types of information about events that happened at a particular time.

  • True
  • False

Question 42)
VPN, RDP and SSH are all classified as what type of protocol?

  • Messaging
  • Internet
  • Network management
  • Remote access

Question 43)
Fingerprint scanners and facial recognition technology are examples of what type of authentication method?

  • Password-based
  • Certificate-based
  • Biometric
  • Multi-factor

Question 44)
True or false: A strong password should be at least 8 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters or symbols. Passwords should also be changed regularly.

  • True
  • False

Question 45)
You can become a target for cyberattacks when you use a public wireless network. How can you mitigate this potential threat?

  • Change your passwords every time after you use a public network.
  • Keep changing the Wi-Fi network you are connected to.
  • Use passwords with special characters and symbols.
  • Use a VPN connection.

Question 46)
Cloud computing offers scalability and remote access. Another benefit is that it is cost-effective because it uses a __________ pricing model.

  • Pay in full
  • Fixed
  • Pay-as-you-go

Question 47)
_____________ is a suite of tools that includes Power BI, Azure Data Lake, and Azure Machine Learning. This suite can collect and analyze customer data, and businesses use it to better understand customer needs and preferences.

  • Azure Insights
  • Azure Analytics
  • Azure Bot

Question 48)
_____ benefits from PaaS because they do not need to worry about the infrastructure or operating system setup and can start working on applications straight away.

  • End users
  • Network engineers
  • Developers

Question 49)
Microsoft 365 is a suite of applications. Which XaaS does it best represent?

  • SaaS
  • IaaS
  • PaaS

Question 50)
Which XaaS gives the cloud provider more responsibility than the user in the shared responsibility model?

  • NaaS
  • IaaS
  • SaaS
  • PaaS

Question 51)
Next-generation firewalls perform many of the same functions as stateful firewalls but include additional functions from other types of firewalls. What are these functions? Select all that apply.

  • Deep packet inspection
  • Packet-filtering
  • VPN support
  • RDP support

Question 52)
True or False: The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another.

  • True
  • False

Question 53)

Logical network diagram
Logical network diagram

 

What is the topology used in this logical network diagram?

  • Bus
  • Star
  • Ring
  • Mesh

Question 54)
When building a hybrid network, what device can be used to both interconnect different networks and provide wireless connectivity?

  • A wireless router
  • A switch
  • A firewall
  • A modem

Question 55)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops, but what layer of the TCP/IP suite do they operate at?

Network diagram

  • Transport
  • Physical layer
  • Application
  • Network access layer

Question 56)
True or false: The SIP protocol comes from the well-known port number range between 0 and 1023.

  • True
  • False

Question 57)
To create a strong password, what is the minimum number of characters that you’re recommended to use?

  • 5
  • 10
  • 8
  • 6

Question 58)
True or false: When using a public wireless network to connect to a secured network like a business network, you can mitigate security threats by changing your passwords every time after you use a public wireless network.

  • True
  • False

Question 59)
Azure Analytics is a suite made up of which three tools? Select all that apply.

  • Azure Machine Learning
  • Azure Data Lake
  • Azure Insights
  • Power BI

Question 60)
App services within Microsoft Azure provide three main capabilities, web apps, mobile apps, and API apps. These services are typically used by developers.

  • False
  • True

Question 61)
True or false: The SaaS service is the best way for a developer to get started straight away without needing to set up an operating system.

  • True
  • False

Question 62)
True or false: Proxy server firewalls perform many of the same functions as stateful firewalls but they also have additional functions such as packet filtering and VPN support.

  • True
  • False

Question 63)
When a switch is used to connect multiple devices together it creates the same physical and logical topology which is the _________ topology?

  • Bus
  • Ring
  • Mesh
  • Star

Question 64)
What kind of device or sensor operates with little or no human interaction or intervention and communicates via the internet to use back-end services provided by the cloud?

  • IoT
  • Laptop
  • Printer
  • Router

Question 65)
Which layers are missing from this diagram of the OSI model? Select all that apply.

Diagram of the OSI model with the titles of layers 3 and 4 masked out.

  • Network layer
  • Internet layer
  • Transport layer
  • Network access layer

Question 66)
Which two layers in the OSI model perform the same functions as the network access layer in the TCP/IP suite? Select all that apply.

  • Data link layer
  • Transport layer
  • Physical layer
  • Application layer

Question 67)
True or false: A DNS server translates website names to IP addresses and stores different information in the form of records.

  • True
  • False

Question 68)
Which file format includes a timestamp, event description, username, and other information, and is used to store event records in a list format?

  • Security file
  • Log file
  • Event file

Question 69)
Remote access technologies can help increase productivity and help save costs for a business. What protocols enable remote access? Select all that apply.

  • RDP
  • SSH
  • SMTP
  • VPN

Question 70)
AI and machine learning can be used to automate processes and make decisions based on patterns identified.

  • False
  • True

Question 71)
App services within Microsoft Azure provide three main capabilities web apps, mobile apps, and API apps but whom are these services intended to help?

  • Network engineer
  • Developers
  • End users

Question 72)
Which Microsoft SaaS provides a suite of applications?

  • Microsoft Teams
  • Microsoft 365
  • Microsoft Word

Question 73)
IPv4 is ____(a) bits long providing over 4 billion addresses, which have now been exhausted. IPv6 is its replacement and uses ___(b) bits, doubling the number of addresses for every additional bit used.

  • (a) 64, (b) 128
  • (a) 16, (b) 32
  • (a) 32, (b) 128

Question 74)
A DNS server translates website names to IP addresses but what type of record stores details of the services supported by that domain?

  • A record
  • SRV record
  • Lookup record
  • Request record

Question 75)
What process is demonstrated by the diagram below?

DHCP IP assignment process

  • IP address to name translation
  • Dynamic IP address assignment
  • Static IP address assignment
  • Name to IP address translation

Question 76)
Identify two disadvantages of cloud computing.

  • Limited control
  • Compatibility issues
  • Full control

Question 77)
What is the model used to identify the responsible party for managing various XaaS components between the cloud provider and the customer?

  • Management model
  • Management responsibility model
  • Responsible model
  • Shared responsibility model

Question 78)
The internet is the biggest ___, allowing for communication across the world.

  • LAN
  • MAN
  • WAN
  • PAN

Question 79)
True or False: On a Windows PC you use the ipconfig command to find the IP address, but on an Apple Mac you use the ipconfig getifaddr en0 command.

  • True
  • False

Question 80)
When a data center is owned and used by one company it is referred to as a ___________(a). If this cloud setup is also on the same site as the users it’s _________(b).

  • (a) Private cloud, (b) Off-premise
  • (a) Public cloud, (b) On-premise
  • (a) Private cloud, (b) On-premise