All Coursera Quiz Answers

Course quiz: Software Hardware and Data Backup Quiz Answers

In this blog post, I will be sharing the answers to the Module 4 Quiz titled “Course quiz: Software, Hardware, and Data Backup Quiz Answers” from the Coursera course “Essential Aspects of Software, Hardware, and Data Backup.”

Enroll Link: Essential Aspects of Software, Hardware, and Data Backup

 

Course quiz: Software Hardware and Data Backup Quiz Answers

Question 1)
Which of the following statements are true?

  • OAuth enables users to grant third-party applications access to their resources without sharing their credentials.
  • OAuth allows users to grant third-party applications access to their resources by sharing their credentials.
  • OAuth is primarily used for user authentication and not for authorization.
  • OAuth requires users to share their login credentials with third-party applications.

Question 2)
Select all the statements that are true.

  • Behavior-based detection in antivirus and antimalware software focuses on monitoring software behavior to identify patterns indicative of malware.
  • Heuristics are a means of ensuring that patches contain antivirus software.
  • Signature Databases are records of user behaviors used to create MFA triggers.
  • Heuristics are carefully crafted rules by professionals as a means of offsetting potential threats.

Question 3)
What is the primary purpose of access control in an organization?

  • Budgeting resource access within organizations
  • Creating an access policy that reflects log-in frequency
  • Limiting the scope of company resources available to individuals
  • Providing unlimited access to all resources

Question 4)
True or False: Supply chain attacks are easy to detect and prevent.

  • True
  • False

Question 5)
True or False: Sandboxing provides a controlled environment for running programs, limiting access to resources like the operating system files and network to prevent malicious software from affecting other computer parts.

  • True
  • False

Question 6)
Select all the statements that are true.

  • Applications requesting access control are intent on malicious behaviour.
  • An application that predicts weather in your region, will need to request some access control.
  • Granting access to personal data, such as contacts or photos, can lead to privacy breaches.
  • Apps can be run without access control so you should avoid all requests.

Question 7)
Role-based access control (RBAC) assigns access rights based on users’ ______ within the organization.

  • seniority
  • roles
  • department
  • abilities

Question 8)
Your company is designing a firewall protection that isolates inside traffic. Your boss has tasked you with creating a solution that will not allow some packets into the system until proper inspection is performed. To protect public-facing servers while still isolating them from the internal network, one can configure a ______________ on the hardware firewall.

  • Priority rules
  • Subnet mask
  • DMZ (Demilitarized Zone)
  • VPN (Virtual Private Network)

Question 9)
Your company is putting together a presentation on how they will complete the latest hardware release. It is your job to break down the steps that are involved in gathering, assembling, constructing and configuring the final product. In your presentation, what are you referring to when you discuss the role of Original Equipment Manufacturers (OEMs) in hardware security?

  • They assess the functionality of new equipment on the market
  • Developing software components like anti-malware and firewalls
  • Designing and producing components for other companies to incorporate into finished goods
  • Providing cloud-based services for computer manufacturers

Question 10)
Which of the following Windows security features directly relies on the presence of a TPM?

  • Windows Defender Antivirus
  • BitLocker Drive Encryption
  • Windows Browser
  • Windows Firewall

Question 11)
What is the primary purpose of encryption in data storage?

  • To ensure that data can be safely transferred.
  • Transforming data into unreadable ciphertext
  • Increasing data transfer speed
  • Reducing storage costs

Question 12)
Besides malware, another risk associated with USB drives is the potential for ______________ due to loss or theft of the device.

  • data leakage or data breach
  • physical damage to computer systems
  • data corruption
  • unauthorized software installation

Question 13)
True or False: You work for a large corporation who are constantly looking to safeguard their software, while still minding costs. The company computers have been fitted with secure UEFI Secure Boot. Your boss argues that there is no need to pay for an advanced malware anti-virus program. This is true because UEFI’s Secure Boot feature guarantees complete protection against all forms of malware.

  • True
  • False

Question 14)
True or False: Storage and backups serve the same purpose.

  • True
  • False

Question 15)
You’re an IT consultant for a small graphic design firm. Their current setup involves storing project files on individual workstations with external hard drives for occasional backups. They’re experiencing increased downtime due to occasional hard drive failures and want to improve data protection while also potentially boosting performance.
Considering their need for both data redundancy and improved read/write speeds they want a storage solution that balance security without an excessive overheard. Which RAID level would you recommend for the graphic design firm?

  • RAID 0 (Striping)
  • RAID 5 (Striping with Parity)
  • RAID 1 (Mirroring)
  • RAID 10

Question 16)
A small business needs a backup method that minimizes storage space and backup time. Their data changes moderately throughout the week. Which would be the most suitable option?

  • Incremental backups
  • Mirroring
  • Full backups
  • Partial backups

Question 17)
Rusha, a freelance photographer, needs to back up large image files. She has a limited budget but prioritizes fast access to her data for editing purposes. She wants to use a local backup solution for the speed it offers. But what disadvantages of local backups does she need to consider ? Select all that apply.

  • Scalability limitations
  • Vulnerability to local disasters
  • Limited control
  • Data privacy issues

Question 18)
Select all the statements that are true.

  • VM snapshots capture the state of a virtual machine at a specific moment.
  • A system recovery can mitigate broadband issues in the case of a natural disaster.
  • A VM allows for the use of any operating system regardless of the device.
  • A VM snapshot is a defensive approach to mitigate against malware.

Question 19)
True or False: Data accessibility and data recovery are different concepts.

  • True
  • False

Question 20)
The ETL process stands for Extract, Transform, and _______.

  • Load
  • Link
  • Leverage
  • Lookup

Question 21)
Select all the statements that are true.

  • A strong GPU is required for heavy duty image processing.
  • A JPEG is an instance of lossless compression storage.
  • ETL is a process for improving image quality.
  • Video processing applies techniques similar to image processing across sequences of frames.

Question 22)
Which video codec is known as the workhorse of the digital video age?

  • AVariation 2
  • VP9
  • H.264/AVC
  • JPEG

Question 23)
Select all the statements about lossy and lossless compression that are true.

  • Lossless audio compression offers smaller file sizes than lossy compression but with no impact on sound quality.
  • Lossless preserves quality.
  • Lossy compression is not fit for streaming.
  • FLAC is a lossless compression format.
  • Lossy preservation results in a large file size.

Question 24)
True or False: PDFs include interactive elements like forms.

  • True
  • False

Question 25)
You attempt to open a document you’ve been working on, but receive an error message stating the file is corrupt.

Which of the following would be the first logical troubleshooting step?

  • Check for a backup version of the document.
  • Scan your computer for malware.
  • Convert the file to a different format.
  • Update your operating system.

Question 26)
Your company needs to implement an off-site backup solution for critical business data. Security and long-term storage are paramount. Additionally they want to keep the storage low cost. Which option would be most suitable?

  • Hard Disk Drive (HDD)
  • Solid-State Drive (SSD)
  • Magnetic Tape
  • Cloud Storage

Question 27)
What is a key advantage of using Network Attached Storage (NAS)?

  • Centralized data storage accessible over a network
  • Lower overall IT costs
  • Easy integration with cloud-based services
  • Scalable storage capacity and enhanced data security

Question 28)
What is a key advantage of using Solid-State Drives (SSDs) over Hard Disk Drives (HDDs)?

  • Faster data access
  • Lower cost per gigabyte
  • Higher storage capacity
  • Slower data access times

Question 29)
You are setting up a new external hard drive to be used across different devices and operating systems. Which file system would be the most suitable choice and why?

  • FAT32, for its compatibility with a wide range of devices
  • FAT16, for its lightweight design
  • exFAT, for its compatibility across different devices and operating systems
  • NTFS, for its large file support

Question 30)
A photographer needs to store thousands of high-resolution RAW image files. Storage space is limited. Which of the following is likely to offer the best balance between image quality and storage savings?

  • Run-Length Encoding (RLE)
  • Lossy compression with a high-quality setting (e.g., JPEG)
  • No compression, to preserve maximum quality
  • Lossless compression (e.g., a specialized RAW compressor)