In this article, I’m simply sharing my thoughts and review of the Intro to Computers and OS Security Quiz Answers.
Just finished the Coursera course “Introduction to Computers and Operating Systems & Security“? In this post, I’m sharing a quick review of the course along with all the quiz answers to help fellow learners. Whether you’re brushing up on tech basics or diving into OS and cybersecurity for the first time, this course offers a solid foundation — and I’ve got your back with the answers! Computers & OS Security Quiz Answers
Table of Contents
Module quiz: Introduction to computers and operating systems Quiz Answers
Question 1)
True or False: Plug-and-play refers to the process of installing a device to a computer by connecting the device and then clicking on a “play” button to activate it.
- True
- False
Question 2)
Imagine that you would like to set up a security feature to prevent unwanted elements from entering your computer system. Which one of the following should you use to accomplish this?
- Denial of Service
- An anti-virus program
- A firewall
Question 3)
Single answer, shuffle
An attack that attempts to overwhelm a system with requests is known as a __ attack.
- ransomware
- Trojan
- botnet
Question 4)
True or False: An attacker has discovered the password for Sam’s personal email, but it doesn’t work for Sam’s work email. Sam’s work email account is now safe.
- True
- False
Question 5)
Application Software and System Software are examples of _____.
- Software
- Malware
- Hardware
Question 6)
RAM memory can be said to be ____.
- non-volatile
- volatile
- terminal
Question 7)
Which part of the CPU contains logic for how the CPU can handle input?
- Registers
- The control unit
- The arithmetic unit
Question 8)
In which of the following interfaces would you type commands in a command prompt or terminal?
- API
- GUI
- CLI
Question 9)
Which of the following are types of operating systems? Select all that apply.
- Patch operating systems.
- Real quick operating systems
- Time-sharing operating systems
- Batch operating systems
- Distributed operating systems
Question 10)
Which of the following are advantages of proprietary software? Select all that apply.
- It is generally less expensive than open-source software.
- It typically has extensive documentation about how to use it.
- Fixes for errors and bugs are usually implemented quickly.
Question 11)
What is a firewall?
- A block or filter that monitors incoming traffic and prevents harmful entities from entering.
- A type of software that prevents an organization from accessing its own applications.
- A digital wall that retains items with much traffic that could potentially trend and go viral.
Question 12)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a __ attack.
- Trojan
- botnet
- ransomware
Question 13)
Which of the following are examples of non-volatile memory? Select all that apply.
- RAM
- Hard disk drives (HDD)
- USB drives
Question 14)
Which part of the CPU is responsible for receiving a signal?
- Registers
- The control unit
- The arithmetic unit
Question 15)
In computing, which of the following best describes a device driver?
- A program that an OS uses to communicate instructions to a device.
- A set of rules for interacting with a program.
- A hardware component that is required to connect devices to a computer.
Question 16)
An attack that is initiated by tricking the user into clicking a link is known as a __ attack.
- botnet
- Trojan
- ransomware
Question 17)
You would like to create passwords for multiple accounts. Which approaches can reduce the risk of any of the passwords being figured out? Select all that apply.
- Use a different password for each account.
- Avoid using predictable patterns, like incremental numbering.
- Use long sequences of numbers.
Question 18)
____ refers to programs that run the hardware on a computer.
- System software
- Malware
- Application software
Question 19)
Which one of the following statements is true?
- The control unit has two parts, which are the CPU and the arithmetic/logic unit.
- The CPU has two parts, which are the control unit and the arithmetic/logic unit.
- The arithmetic/logic unit has two parts, which are the CPU and the control unit.
Question 20)
Which of the following refers to a set of rules for interacting with a program?
- API
- CLI
- GUI
Question 21)
Which type of operating system rotates across tasks in a queue, allocating a fair amount of time to each one?
- Batch operating system
- Time-sharing operating system
- Distributed operating system
Question 22)
Which of the following are advantages of open-source software (OSS)? Select all that apply.
- It typically has extensive documentation about how to use it.
- The source code can be modified by anyone.
- It is available for free.
Question 23)
When interacting with the hardware of a computer, the OS will communicate instructions through a device _.
- Registry
- Driver
- Preferences
Question 24)
True or False: The increased number of individuals working from home has complicated the threat landscape.
- True
- False
Question 25)
An attack that is intended to disrupt services until a ransom until the attacker’s demands are met is known as a __ attack.
- botnet
- Trojan
- ransomware
Question 26)
____ refers to specific applications like Microsoft Word or Excel.
- System software
- Application software
- Malware
Question 27)
In which of the following interfaces would you expect to find icons for navigating the system?
- API
- CLI
- GUI
Question 29)
An attacker has obtained the password for Sam’s personal email account and gained access. This password does not apply to Sam’s work email, but the security of that account is still at risk; which of the following is a feasible follow-up action that the attacker might take?
- The attacker can link Sam’s personal email to the work email.
- The attacker can find the password for the work email in the personal email messages.
- The attacker can use Sam’s personal email to impersonate her and request a password reset link for the work account.
Question 30)
Which type of operating system connects several CPUs to execute a task?
- Distributed operating system
- Time-sharing operating system
- Batch operating system
Module quiz: Enterprise systems and security Quiz Answers
Question 1)
When a server is said to be ‘down’, which of the following items are retrievable?
- Files
- Nothing
- Directories
Question 2)
Which of the following are means of storing information? Select all that apply.
- Solid State Drives (SSD)
- Database Server
- Application Server
Question 3)
True or False: Scalability is a factor that needs to be considered when deciding upon a backup.
- True
- False
Question 4)
Some backup steps that one can take to protect data include _____ , snapshots, and daily backups.
- Using application servers
- Replication
- Mitigations
Question 5)
A distinct difference between personal computing and commercial computing is ______________?
- Size
- Location
- Security
Question 6)
Which computing environment would be considered most scalable?
- Cloud computing
- Traditional commercial computing
- Personal computing
Question 7)
True or False: Zero Standing access is an example of a security policy of reducing access.
- True
- False
Question 8)
Updating existing code for security or performance enhancement is called __________?
- an update
- a reboot
- A workaround
Question 9)
True or False: Patches will alter large amounts of code.
- True
- False
Question 10)
Which of the following are types of maintenance conducted by a company? Select all that apply.
- Routine maintenance
- Corrective maintenance
- Predictive maintenance
Question 11)
What is meant by the expression ‘The server is down’?
- The server has been infected with malware.
- The server is not running or otherwise unreachable.
- The server is running and responding to requests.
Question 12)
Which one of the following is a means of storing information?
- An operating system
- A firewall
- Solid State Drives (SSD)
Question 13)
Which of the following are desirable backup characteristics? Select all that apply.
- Availability
- Durability
- Transparency
Question 14)
What mitigating steps can you take when protecting your data from unexpected shutdowns or technological failure? Select all that apply.
- Replication
- Daily Backups
- Password protection
Question 15)
Zero Standing access is an example of _______________.
- An anti-virus software system.
- A cloud-based pricing policy.
- A security policy of reducing access.
Question 16)
True or False: Cloud computing is considered more scalable than traditional commercial computing.
- True
- False
Question 17)
True or False: Creating daily backups should help secure your data.
- True
- False
Question 18)
Cloud computing is considered more ____________ than traditional commercial computing.
- secure
- traditional
- scalable
Question 19)
True or False: Predictive maintenance is maintenance caused by a system ceasing to function.
- True
- False
Question 20)
True or False: The expression ‘The Server is Down’ means that content is ready to be accessed.
- True
- False
Question 20)
A distinct difference between cloud computing and traditional computing is ______________?
- Location
- Business type
- Security
Question 21)
Which of the following are the reasons for an automatic software update? Select all that apply.
- To add or improve functionality.
- To remove bugs from code.
- To add a security-related element.
Question 22)
What is described in the following statement?
A small piece of code that modifies a target area and does not impact the overall workings of an application.
- Patch
- Time-sharing operating systems
- A software release
Question 23)
What type of maintenance is forced due to an application ceasing to function or displaying an error?
- Routine Maintenance
- Corrective maintenance
- Predictive Maintenance
Question 24)
True or False: A database Server will store information.
- True
- False
Question 25)
Which of the following are examples of patch types? Select all that apply.
- Bug fix patch.
- A version update patch.
- A security patch.
Module quiz: Business systems applications Quiz Answers
Question 1)
Which of these statements best define what a business need is?
- All of the services used in marketing a product.
- All the requirements included in achieving the money-making aspect of a company.
- The behind-the-scenes requirements of a business.
Question 2)
True or False: Microsoft Dynamics 365 Project Operation is an example of business software.
- True
- False
Question 3)
Which of these email clients is connected to Google Drive for cloud storage?
- Outlook
- Gmail
- Thunderbird
Question 4)
True or False: Cold calling is done with malicious intent.
- True
- False
Question 5)
True or False: POP3 is an example of an email protocol.
- True
- False
Question 6)
Microsoft 365 is a family of software packages that can be tailored to personal, business, or __________ use.
- economic
- educational
- traditional
Question 7)
_____________ is block-level storage accessed using virtual machines.
- Azure Managed Disks
- Azure Blobs
- Azure Files
Question 8)
In which one of these types of storage would data be more processed?
- Data warehouse
- Both are processed equally
- Data lake
Question 9)
Sam wants to know what customers’ thoughts are on some newly introduced ice cream flavors, so she creates a feedback form on which customers can rate each one on a scale of 1 to 5 stars. What is Sam practicing with this method?
- Data collection
- Data analysis
- Data storage
Question 10)
Why is it important to preprocess data before using it to train a machine learning model?
- Preprocessing converts data to numbers that the computer can understand.
- The computer will return an error if the data has not been preprocessed.
- If the data contains errors, the computer will give poor or inaccurate predictions.
Question 11)
Which of the following items relate to business needs? Select all that apply.
- Sales
- Accounting
- Payroll
Question 12)
Which of the following business applications would be most appropriate for a company with mobile agents?
- Microsoft Dynamics 365 Field Service
- Microsoft Dynamics 365 Sales
- Microsoft Dynamics 365 Customer Service
Question 13)
Which of these email clients is open-source and highly customizable?
- Thunderbird
- Gmail
- Outlook
Question 14)
SMTP is an example of a protocol that _______________.
- Uploads a user’s email from the client application to the email server.
- Downloads email from the email server to the client.
- Directs the email from the sender to the appropriate IP address.
Question 15)
True or False: Azure Blob Storage is suitable for storing streamed data.
- True
- False
Question 16)
Sam has sales data from the Sam’s Scoop storefront, as well as sales data from online orders. She would like to combine all this information to get a more complete picture. Which data processing technique should she apply?
- Data integration
- Data visualization
- Data analysis
Question 17)
When preprocessing data to be used for machine learning model, which elements should you identify and remove? Select all that apply.
- Errors
- Missing values
- Information that doesn’t fit with the rest of the data
Question 18)
Which one of the following statements best describes business software?
- A software application that facilitates a business in administering the various aspects of the business.
- It is the software that sells the business product.
- It is industrial standard software.
Question 19)
A data warehouse is similar to a data lake except that the information found there has been _____.
- Simplified
- Processed
- Updated
Question 20)
The process of labeling suspect messages as dangerous and keeping them separate for further investigation is known as _______.
- Filtering
- Automatic and continuous virus scanning
- Quarantining
Question 21)
What is Microsoft 365?
- A cloud hosting service that offers several options for storage space.
- A family of software packages that can be tailored for your specific needs.
- An email server service with integrated security and filtering features.
Question 22)
Consider the following scenario: You want to store streamed data from your security cameras. Which Azure storage option would be the most suitable choice to handle this?
- Azure Files
- Azure Blob Storage
- Azure Managed Disks
Question 23)
Sam has identified an upward sales trend for one of the experimental ice cream flavors at the seaside shop for Sam’s Scoops and would like to present this information to stakeholders. Which data processing technique should she apply?
- Data analysis
- Data integration
- Data visualization
Question 24)
Which of these steps should be taken before training a machine learning model?
- Collect data
- Preprocess data
- Test predictions
Question 25)
True or False: Accounting is considered one of the “business needs”.
- True
- False
Question 26)
Which of these email clients supports add-ons such as Microsoft Teams and OneDrive?
- Outlook
- Gmail
- Thunderbird
Question 27)
POP3 is an example of a protocol that ____________.
- Downloads email from the email server to the client.
- Directs the email from the sender to the appropriate IP address.
- Uploads a user’s email from the client application to the email server.
Question 28)
True or False: Data lakes are more processed than data warehouses.
- True
- False
Question 29)
True or False: Microsoft 365 is a family of software packages aimed exclusively at large businesses and enterprises.
- True
- False
Course quiz: Introduction to computers and operating systems, and security Quiz Answers
Question 1)
Which computing environment is identity and access management (IAM) most associated with?
- On-premises commercial computing
- Cloud-based commercial computing
- Personal computing
Question 2)
What does the CRM in Microsoft CRM stand for?
- Customer Relationship Marketing
- Consumer Reliance Management
- Customer Relationship Management
Question 3)
Which of the following is a benefit of Azure Managed Disks?
- It enables sharing of files stored in the cloud.
- It provides versatile storage options without the need for costly hardware like HDDs and SSDs.
- It stores large, unstructured objects in containers.
Question 4)
Which of the following is a reason for storing data in a data lake?
- Future unknown values may be found in the data.
- It is ready for applying to analytics and extracting reports.
- The structure and goal of the data is known and well defined.
Question 5)
Which of the following computing environments is likely to have the most hardware?
- Commercial cloud computing
- Commercial on-premises computing
- Personal computing
Question 6)
True or False: Just-in-time (JIT) access is a policy of Zero Standing Access.
- True
- False
Question 7)
True or False: A company releases software that it believes to be safe from attack. Shortly after, a shortcoming is discovered and exploited to install ransomware on users’ devices. This is an example of a zero-day exploit.
- True
- False
Question 8)
Maintenance that occurs in response to failure is known as ____________ maintenance.
- Corrective
- Predictive
- Routine
Question 9)
True or False: Patches add functionality to code.
- True
- False
Question 10)
_________ is when the information gained from data analysis is portrayed in a graphic format, such as a line graph or a bar chart.
- Data visualization
- Data storage
- Data integration
Question 11)
Which of the following are elements of the threat landscape? Select all that apply.
- The methods of attack used.
- The potential vulnerabilities of an application.
- The potential attackers who target vulnerabilities.
- The impact of an attack.
Question 12)
Which of the following descriptions best defines ransomware?
- Tricking a user to activate malicious code by clicking on it.
- Preventing legitimate users’ access to their own files.
- Automated and repetitive attacks on a system.
Question 13)
Why should you avoid using a single password across multiple accounts?
- Some services allow for simpler, easier-to-remember passwords than others.
- If an attacker obtains the password and associated email address, it can be used to access other accounts.
- It’s easier to remember several short passwords than one long one.
Question 14)
True or False: Non-volatile memory is memory that will persist after the computer is turned off.
- True
- False
Question 15)
Which of the following can be used to take input?
- Keyboard
- Monitor
- CPU
Question 16)
Which of the following definitions best describes a distributed operating system?
- An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
- An OS that connects several dispersed CPUs to execute tasks.
- An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
Question 17)
True or False: An operating system is a small piece of code that allows software and hardware to communicate.
- True
- False
Question 18)
True or False: iOS is used in mobile devices.
- True
- False
Question 19)
True or False: Linux is an example of open-source software.
- True
- False
Question 20)
Which of the following is a benefit of machine learning?
- Machine learning models are well-suited for handling large amounts of data that would take great time and effort to analyze manually.
- Machine learning models can automatically collect data to analyze.
- Machine learning models and can detect and automatically correct errors in data.
Question 21)
Which of the following statements defines POP3?
- A series of predetermined steps a computer uses to achieve a given task.
- The procedures used to retrieve an email when it has arrived at the correct IP address.
- A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.
Question 22)
Which of the following email clients uses OneDrive to provide additional cloud storage?
- Outlook
- Thunderbird
- Gmail
Question 23)
Which of the following definitions best describes email spoofing?
- An unsolicited email offering genuine products or services.
- A fraudulent email from a supposedly known source like Amazon or the post office.
- Attempting to hook people and trick them into revealing sensitive information about themselves.
Question 24)
A machine learning model can be trained to recognize elements that are unusual and indicate a potential issue, and trigger an action or alert in response. This describes _________.
- Computer vision
- Object detection
- Anomaly detection
Question 25)
A machine learning model is given many images of a busy street, and eventually it is able to discern between cars, buses, and cyclists. This is an example of _________.
- Knowledge mining
- Anomaly detection
- Object detection
Question 26)
Sam is using Microsoft Teams to host an important video meeting, and her computer is under heavy load. To ease the demand without reducing performance, how might the CPU respond?
- The CPU will throttle down its clock speed.
- The CPU will use multi-threading.
- The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
Question 27)
True or False: Storing data in a data warehouse is a more sophisticated process than storing data in a data lake.
- True
- False
Question 28)
Which of the following definitions best describes quarantining?
- Keeping lists of domains and sites that are either allowed or not allowed through.
- Monitoring the sender’s profile and only allows reputable sources in.
- Separating suspect emails for further analysis.
Question 29)
___________is software that helps a company to perform operations relating to the goal of making profit.
- Hacking Software
- Business Software
- Proprietary Software
Question 30)
Business applications originate from___________.
- Customer relationship management (CRM) systems
- Enterprise resource planning (ERP)
- Line-of-business solutions (LOB)
Question 31)
True or False: Identity and access management (IAM) is a cloud-based initiative to protect against hackers.
- True
- False
Question 32)
True or False: Microsoft CRM is built on Microsoft’s Power Platform.
- True
- False
Question 33)
Which of the following is a massively scalable object store for text and binary data?
- Azure Blob Storage
- Azure Files
- Azure Managed Disks
Question 34)
Select the most appropriate definition for Zero Standing Access.
- Limiting a user’s range of access.
- Limiting a user’s access time and scope.
- Limiting the length of time in which a user can access a domain.
Question 35)
Which of the following statements accurately describe zero-day exploits? Select all that apply.
- They include the use of ransomware.
- They concern attacks that have been documented and patched.
- They are done on previously unknown issues.
Question 36)
Which of the following descriptions best defines a Trojan attack?
- Tricking a user to activate malicious code by clicking on it.
- Preventing legitimate users’ access to their own files.
- Automated and repetitive attacks on a system.
Question 37)
Assuming it is only used for one account, which of these passwords would be the most resistant against an attempted attack?
- sandiego2016!
- FjY123
- HVh#8D!2f7$R
Question 38)
Which of the following are examples of desktop operating systems? Select all that apply.
- Windows
- MacOS
- iOS
Question 39)
Which of these statements are true about machine learning? Select all that apply.
- Machine learning models are guided by sets of rules called algorithms.
- After training on a sufficient amount of data, a computer can make predictions about any new data that is added.
- Machine learning models and can detect and automatically correct errors in data.
Question 40)
Which of the following statements defines Simple Mail Transfer Protocol (SMTP)?
- A series of predetermined steps a computer uses to achieve a given task.
- A set of procedures allowing an electronic mail to find a destination IP, similar to how a switchboard was used to route long-distance calls.
- The procedures used to retrieve an email when it has arrived at the correct IP address.
Question 41)
True or False: Anomaly detection is a task that can be achieved by machine learning.
- True
- False
Question 42)
True or False: Object detection can be used to identify objects automatically from a picture.
- True
- False
Question 43)
Sam is running several applications on her laptop at once, and the temperature of the CPU has gotten quite high. How might the CPU respond to this?
- The CPU will increase its clock speed.
- The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
- The CPU will throttle down its clock speed.
Question 44)
Which of the following characteristics suggests that a store is a data warehouse? Select all that apply.
- Similarly structured data is grouped together.
- Unordered, random data items.
- The presence of an index.
Question 45)
True or False: Business software is software that is directly associated with the product the company makes.
- True
- False
Question 46)
True or False: Customer relationship management (CRM) systems predate Line-of-business solutions (LOB).
- True
- False
Question 47)
Microsoft Customer ______ Management (CRM) is built on Microsoft’s Power Platform.
- Reliance
- Relevant
- Relationship
Question 48)
Which of the following are reasons for storing data in a data warehouse? Select all that apply.
- The data can act as a single source of truth.
- It allows one to remove noise from data by filtering and cleaning data.
- By storing all of the data, users can create different exploratory queries.
Question 49)
True or False: Cloud-based computing requires extensive hardware for a new business.
- True
- False
Question 50)
Allowing worker access to limited parts of your business is an example of a _____ policy.
- Just-in-time (JIT) access
- Just-enough-access (JEA)
- 3-2-1 backup strategy
Question 51)
Which of the following best describes a zero-day exploit?
- A flaw in a system was identified and closed with zero days left of danger.
- Exploiting a vulnerability not known before the attack.
- The day an exploit was launched.
Question 52)
Maintenance that is performed according to a preplanned schedule is known as ____________ maintenance.
- Routine
- Corrective
- Predictive
Question 53)
Which of the following reasons might deter one from implementing a patch? Select all that apply.
- It can fix an issue or flaw.
- It can break the flow of concentration.
- It can alter functionality.
Question 54)
_________ relates to combining data that comes from different sources into one common format.
- Data integration
- Data storage
- Data analysis
Question 55)
Which of the following descriptions best define a botnet attack?
- Automated and repetitive attacks on a system.
- Preventing legitimate users’ access to their own files.
- Tricking a user to activate malicious code by clicking on it.
Question 56)
True or False: Basing a password on a meaningful word, like a pet’s name, is safer than using easily-found information like a birthday.
- True
- False
Question 57)
A ____________ is a small piece of code that allows messages and instructions to pass between hardware and software components.
- Operating system
- Internet of things
- Device Driver
Question 58)
Which of the following are examples of proprietary software? Select all that apply.
- Windows
- MacOS
- Linux
Question 59)
Which of the following email clients uses Google Drive to provide additional cloud storage?
- Gmail
- Outlook
- Thunderbird
Question 60)
Which of the following definitions best describes customer relationship management software?
- Software that is designed exclusively to aid product development.
- Software that facilitates communication between client and customer.
- Software that is designed to help a company with payroll issues.
Question 61)
Commercial on-premises computing will require more ________ than personal or commercial cloud-based environments.
- Software
- Users
- Hardware
Question 62)
Which of these outcomes can be accomplished with a patch? Select all that apply.
- Removal of incompatibilities and flaws
- Additional functionality
- Mitigation of infection
Question 63)
_________ is the process of getting useful information out of raw data by observing relationships and patterns.
- Data analysis
- Data integration
- Data visualization
Question 64)
True or False: A firewall can remove cyber intruders from your files.
- True
- False
Question 65)
Which of the following are examples volatile memory? Select all that apply.
- Hard Disk Drive
- RAM
- Solid State Drive
Question 66)
Which of the following can be used for processing?
- Keyboard
- Monitor
- CPU
Question 67)
Which of the following definitions best describes a time-sharing operating system?
- An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
- An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
- An OS that connects several dispersed CPUs to execute tasks.
Question 68)
Which of the following is an example of a mobile operating system?
- iOS
- MacOS
- Windows
Question 69)
______________ is/are an example of trying to elicit information from people by deceiving them.
- Ads
- Phishing
- Email spoofing
Question 70)
Which of the following techniques can be used to detect fraud? Select all that apply.
- Supervised Learning
- Object detection
- Machine Learning
Question 71)
______________ is the practice of isolating suspicious emails.
- Filtering
- Quarantining
- Virus scanning
Question 72)
True or False: Azure Files is used for storing large objects.
- True
- False
Question 73)
Which of the following definitions best describes a batch operating system?
- An OS that connects several dispersed CPUs to execute tasks.
- An OS that operates in a timed manner: a unit of time called a quantum is allocated to each task.
- An OS that allows multiple users to work in tandem by compartmentalizing each user’s actions and only allowing one user control at any given time.
Question 74)
True or False: Machine learning models are guided by sets of rules called algorithms.
- True
- False
Question 75)
True or False: Thunderbird is an email client that provides cloud storage as part of the service.
- True
- False
Question 76)
A data warehouse is like a data lake except that the information found there has been _____________, so it is easily acceptable.
- Processed
- Unindexed
- Anonymized
Question 77)
Maintenance that is performed when signals suggest that an issue is likely to occur is known as ____________ maintenance.
- Routine
- Predictive
- Corrective
Question 78)
At a physical storefront, you might place a security guard at the entrance to prevent intruders from getting in. For a web business, which of the following would you use to keep unwanted elements out of the system?
- Spam filter
- Anti-virus program
- Firewall
Question 79)
Which of these statements are true about anomaly detection? Select all that apply.
- It can only be used with images.
- It can be used in such applications as financial fraud detection and finding indicators of impending engine trouble in a car.
- It concerns the capability to automatically detect errors or unusual activity in a system.
Question 80)
How might a CPU respond when several applications are open at once, placing a heavy strain on resources? Select all that apply.
- The CPU will use multi-threading.
- The CPU will trigger a warning message that tells Sam to close some applications and reduce the workload.
- The CPU will throttle down its clock speed.
Question 81)
True or False: Data found in a data warehouse is more easily classified.
- True
- False
Question 82)
Which of the following are examples of non-volatile memory? Select all that apply:
- Solid State Drive
- Hard Disk Drive
- RAM
Question 83)
Which of the following is an example of open-source software?
- Linux
- Windows
- MacOS
Question 84)
True or False: Quarantining is an effective means of preventing hackers.
- True
- False
Question 85)
Which of the following definitions best describes business software?
- Software that can be used to access a company discreetly.
- Software that has a special license for use.
- Software that addresses such needs as financial analysis and growth, customer management and analysis.
Question 86)
Which of the following can be used for output?
- Keyboard
- CPU
- Monitor
Question 87)
True or False: Ads are a type of spam.
- True
- False
Question 88)
________ and Access Management (IAM) is a cloud-based security framework.
- Identity
- Interest
- Individual
Question 89)
Which of the following definitions best describes a device driver?
- An application that facilitates communication between user, hardware and software.
- An application for taking in user input and executing the commands found in there.
- A small piece of code that facilitates communication between hardware and software.
You can also read these article: How to Create a Countdown Timer with Alpine.js
My Review of the Intro to Computers and OS Security Quiz Answers
I recently completed the “Introduction to Computers and Operating Systems & Security” course on Coursera, which is part of the Microsoft Cybersecurity Analyst Professional Certificate. This course is a great starting point for anyone curious about cybersecurity or aiming to break into the field with no prior experience.
It’s designed to build foundational knowledge around computer systems, operating systems, enterprise environments, and basic cybersecurity concepts.
The course is divided into four modules, each introducing key components such as hardware, how computers interact with operating systems, the cybersecurity landscape, and different business computing environments.
What I liked most was how beginner-friendly and clearly structured the content was, making it easy to follow even without a technical background. It effectively bridges the gap between basic computer knowledge and the more advanced topics you’ll encounter later in the cybersecurity field. If you’re considering a career in cybersecurity, this course is a helpful first step — and in this blog post, I’ve also included the quiz answers to support fellow learners as they work through the material.