Skip to content

Niyander Tech

Learn with fun

Menu
  • Home
  • Categories
    • Android
    • Alpine.js Components
    • Genshin Impact News
    • Jobs and Internship
    • Coursera Hub
  • Our Policies
    • Privacy Policy
    • Terms and Conditions
    • Contact Us
  • Coursera Search Engine
  • AI Tools
    • AI Background Remover
    • AI Video Downloader
    • 98+ Beautiful CSS Box-Shadow
    • G-Drive Download Link Generator
Menu
Intro to Networking and Cloud Computing Quiz Answers + Review

Intro to Networking and Cloud Computing Quiz Answers + Review

Posted on April 8, 2025April 18, 2025 by Niyander

In this article, I’m simply sharing my thoughts and review of the Intro to Networking and Cloud Computing course along with all the quiz answers.

Just finished the Coursera course “Introduction to Networking and Cloud Computing”? You’re in the right place! In this post, I’m sharing a quick review of the course and providing all the quiz answers to help fellow learners progress with confidence.

Whether you’re exploring networking basics, learning about cloud services, or working toward the Microsoft Cybersecurity Analyst Professional Certificate, this course is a solid step forward — and I’ve got your back with the answers!

Table of Contents

  • Module quiz: Computer networking Quiz Answers
  • Module quiz: Network devices and protocols Quiz Answers
  • Module quiz: Network security Quiz Answers
  • Module quiz: Cloud computing and networking Quiz Answers
  • Self-review: Digital transformation Quiz Answers
  • Course quiz: Introduction to Networking and Cloud Computing Quiz Answers
  • My Review: Intro to Networking and Cloud Computing

Module quiz: Computer networking Quiz Answers

Question 1)
True or False: A PAN is used to cover entire countries.

  • True
  • False

Question 2)
Which of the following statements is true?

  • A mesh network only has a single path
  • A mesh network has multiple paths
  • Data travels in one direction in a mesh network

Question 3)
True or False: The bus topology is less common today because older hubs on networks are being replaced with switches and routers.

  • False
  • True

Question 4)
True or False: A WLAN provides greater mobility, flexibility and has no security risks.

  • True
  • False

Question 5)
IPv4 uses decimal numbers for its addresses, what does IPv6 use for its addresses?

  • Binary numbers
  • Decimal numbers
  • Hexadecimal

Question 6)
What does a subnet mask identify?

  • A router
  • Network and host sections of an IP address
  • An IP address

Question 7)
What are some of the differences between IPv4 and IPv6? Select all that apply.

  • IPv6 does not support Broadcast traffic
  • IPv6 has built in security
  • IPv6 does not support DHCP
  • IPv6 addresses cannot be assigned manually.

Question 8)
It takes 4 steps to receive an IP address when using the _____ protocol.

  • TCP
  • DHCP
  • IPv6
  • IP

Question 9)
An IP default gateway identifies a ________ on a network?

  • A network
  • A router
  • A printer
  • A path

Question 10)
The subnet mask 255.0.0.0 is for what class of network?

  • A
  • C
  • B

Question 11)
LANs and WLANs are used within buildings and homes, but what network type can cover entire countries?

  • PAN
  • WAN
  • MAN

Question 12)
True or False: The Mesh topology is expensive to set up.

  • True
  • False

Question 13)
A _____topology is created when using a switch, which is replacing the ____ topology as hubs are being removed from networks.

  • Bus, star
  • Star, bus
  • Bus, mesh
  • Mesh, bus

Question 14)
True or False: A WLAN has a limited range and signal strength, and it also has security risks.

  • True
  • False

Question 15)
IPv4 uses decimal numbers and _________are used for IPv6.

  • Binary numbers
  • Hexadecimal
  • Decimal numbers

Question 16)
A subnet mask is used to identify _______?

  • A router
  • Network and host sections of an IP address
  • An IP address

Question 17)
DHCP can be used to obtain an IPv4 address, but how many steps does it take to receive the IP address?

  • 5
  • 4
  • 6
  • 2

Question 18)
True or False: An IP default gateway identifies a router on a network.

  • True
  • False

Question 19)
True or False: 255.0.0.0 is a subnet mask, for a class B network.

  • False
  • True

Question 20)
MANs are used across cities, but what network type can cover entire countries?

  • PAN
  • WAN
  • MAN

Question 21)
The Mesh topology can be expensive to set up, but what is an advantage of this topology type?

  • Data travels in one direction
  • Multiple paths
  • Single path

Question 22)
True or False: Hexadecimal numbers are used to address IPv4, and IPv6 uses decimals numbers

  • True
  • False

Question 23)
True or False: When obtaining an IPv4 address via DHCP it takes for 4 steps for an IP address to be assigned.

  • True
  • False

Question 24)
What does an IP default gateway identify?

  • A router
  • A network
  • A path
  • A printer

Module quiz: Network devices and protocols Quiz Answers

Question 1)
When joining networks and subnets, a _______ is used to connect the different network areas.

  • Router
  • Switch
  • Firewall

Question 2)
The application layer in the TCP/IP suite brings together which three layers from the OSI model? Choose all that apply.

  • Presentation
  • Session
  • Application
  • Internet

Question 3)
True or False: When using a private and public cloud together, they form a hybrid cloud.

  • True
  • False

Question 4)
Virtual private network (VPN) technology can be used to connect to private and public clouds using _______ VPNs and site-to-site VPNs.

  • Office
  • User
  • Remote

Question 5)
SMTP, IMAP, and POP3 are protocols used within what application?

  • Remote connectivity application
  • Email
  • Web browsers

Question 6)
HTTPS uses which two protocols to encrypt web content traffic to prevent a man-in-the-middle attack?

  • SSH
  • TLS
  • SSL
  • FTPS

Question 7)
True or False: For secure web browsing port number 80 is used with HTTPS and for unsecured browsing port number 443 is used with HTTP.

  • True
  • False

Question 8)
True or False: DNS is critical to the use of the internet but DNS hijacking, spoofing and amplification are types of attacks that make it very vulnerable.

  • True
  • False

Question 9)
True or False: Traffic prioritization and marking packets are part of the quality of service (QOS) suite of network management mechanisms.

  • True
  • False

Question 10)
True or False: When searching through log files, using the Windows command prompt application and the findstr command helps to filter down what you are looking for.

  • True
  • False

Question 11)
What device is needed when joining different networks and subnets together?

  • Switch
  • Router
  • Firewall

Question 12)
What type of cloud setup do you have if you use your own private cloud as well as services from the public cloud?

  • Cloud of clouds
  • Hybrid cloud
  • Cloud
  • Multi-cloud

Question 13)
VPNs can be used to connect offices and home users to public and private cloud setups, but what are the two VPN types needed?

  • Site-to-site
  • VPN home
  • Remote
  • VPN client

Question 14)
True or False: HTTPS is the best protocol for a secure connection while surfing the web with your browser.

  • True
  • False

Question 15)
When using a web browser, the HTTP protocol uses port number 80 but what port number does HTTPS use?

  • 22
  • 8080
  • 443
  • 8000

Question 16)
Traffic management involves many different mechanisms that form part of which suite?

  • Metric analysis
  • Quality of service (QOS)
  • Network availability

Question 17)
True or False: A switch is used to join different networks and subnets together.

  • True
  • False

Question 18)
Email can use which three protocols? Choose all that apply.

  • POP3
  • SMTP
  • FTP
  • IMAP

Question 19)
Port number ____ is used with HTTP and port number ____ is used with HTTPS when using a web browser.

  • 22, 8000
  • 443, 80
  • 80, 443
  • 8000, 22

Question 20)
DNS is a protocol critical to the use of the internet but because it’s widely used it’s vulnerable to what kind of attacks? Choose all that apply.

  • DNS hijacking
  • DNS amplification
  • DNS spoofing
  • DNS ghosting

Question 21)
Which of the following options are traffic management mechanisms from the quality of service (QOS) suite? Choose all that apply.

  • Traffic prioritization
  • Traffic Jitter
  • Traffic latency
  • Traffic marking

Question 22)
The hybrid cloud is made up of which cloud setup types? Choose all that apply.

  • Private cloud
  • Public cloud
  • Multi-cloud
  • Cloud of clouds

Question 23)
DNS is critical to the use of the internet but it’s vulnerable to attack. What type of attack overwhelms a target device with hundreds of DNS messages?

  • DNS tunneling
  • DNS Spoofing
  • DNS hijacking
  • DNS amplification

Question 24)
VPNs can be used to connect offices to public and private cloud setups, but what kind of VPN can be used to connect to the office network from home?

  • Site-to-site
  • Home
  • Remote

Question 25)
True or False: The TCP/IP suite combines the OSI model’s application, presentation and session layers into one application layer.

  • True
  • False

Question 26)
True or False: SMTP, POP3, and SSH are all used within an email application.

  • True
  • False

Question 27)
When selecting protocols to use, it is best to choose a protocol that provides some level of encryption. Which protocol would be best for web page content delivery?

  • HTTP
  • FTPS
  • HTTPS
  • FTP

Module quiz: Network security Quiz Answers

Question 1)
Publish-subscribe is a type of client-server model where clients receive updates from the server on specific events. What other client-server models can you identify? Select all that apply.

  • Request-query-subscribe model
  • Publish-query model
  • Request-response model
  • Peer-to-peer model (P2P)

Question 2)
What components can be used to create rules within a firewall? Select all that apply.

  • Direction
  • Password
  • Source IP address
  • Protocol

Question 3)
True or False: Contemporary firewalls evolved from the very first type of firewall, the packet-filtering firewall.

  • True
  • False

Question 4)
A ____________ attack involves intercepting communication between two parties and relaying information between them so they are unaware of the attack.

  • IP spoofing
  • Eavesdropping
  • Man-in-the-middle
  • Backdoors

Question 5)
True or False: Change control is a great way to test and look for threats on the network.

  • True
  • False

Question 6)
What is network sniffing?

  • Listening to the communication between two network devices
  • Gaining unauthorized access to a network
  • Spreading malware
  • Cracking a password

Question 7)
What tier of authorization provides the lowest level of access?

  • User access
  • Administrator access
  • Guest access
  • Conditional access

Question 8)
Identify types of authorization protocols. Select all that apply.

  • TLS
  • TACACS+
  • LDAP
  • RADIUS

Question 9)
How many steps are involved in the DHCP IP address assignment process?

  • 4
  • 8
  • 6

Question 10)
True or False: DHCP relay is used to forward DHCP requests blocked by routers on the network.

  • True
  • False

Question 11)
True or False: The publish-subscribe server model allows clients to send requests to the server to query its database.

  • True
  • False

Question 12)
True or False: Firewall rules are created using a list of usernames and passwords of who can access what service.

  • True
  • False

Question 13)
What firewalls have evolved from the very first type, the packet-filtering firewall? Select all that apply.

  • Stateful firewall
  • Stateless firewall
  • Next-generation firewall
  • Third-generation firewalls

Question 14)
True or False: A man-in-the-middle attack involves intercepting communication between two parties.

  • True
  • False

Question 15)
What steps are involved in the DHCP IP address assignment, and in what order? Select all that apply.

  • The first two steps are DHCP discover, then DHCP offer
  • The second two steps are DHCP discover, then DHCP offer
  • The first two steps are DHCP request, then DHCP acknowledgement
  • The second two steps are DHCP request and then DHCP acknowledgement

Question 16)
When a router is in the way of a DHCP request, a DHCP ____ is needed to forward the request to the DHCP server.

  • Client
  • Server
  • Passer
  • Relay

Question 17)
Different components, including source and destination IP addresses, protocols and ports are used to form firewall _______.

  • Blockages
  • Authorization
  • Rules
  • Access

Question 18)
Which of these are types of authorization protocols?

  • RADIUS, LDAP, TACAC+
  • LDAP, TLS, RADIUS
  • LDAP, SSL, RADIUS

Question 19)
When a router is in the way of a DHCP request, what is needed to forward the request on behalf of the DHCP client?

  • DHCP server
  • DHCP passer
  • DHCP relay
  • DHCP client

Question 20)
Many firewalls that exist today are still based on the very first type that simply permitted or denied packets based upon a set of rules. What is this firewall called?

  • Packet-filtering
  • Stateful firewalls
  • Proxy server firewalls
  • Application-layer firewalls

Question 21)
True or False: Guest access is a high-level tier of authorization.

  • True
  • False

Question 22)
What two network analysis procedures can be used to identify threats and check for potential vulnerability?

  • Change control
  • Continuous monitoring
  • Penetration testing

Question 23)
Guest access is the lowest authorization tier, but what other tiers have the highest authorization level to manage the system? Select all that apply.

  • Superuser access
  • User access
  • Conditional access
  • Administrator access

Question 24)
True or False: DHCP IP address assignment involves four steps: DHCP discover, offer, request, and acknowledgement.

  • True
  • False

Question 25)
What type of network attack involves an attacker intercepting communication between two parties who are unaware that someone else is listening because traffic seems to flow normally?

  • Eavesdropping
  • IP spoofing
  • Man-in-the-middle
  • Backdoors

Question 26)
What network analysis procedure involves testing users by sending fake or suspicious emails?

  • Continuous monitoring
  • Change control
  • Penetration testing

Question 27)
True or False: Manipulating data packets to impersonate another device or user is known as spoofing.

  • True
  • False

Question 28)
True or False: RADIUS, TACACS and LDAP are all types of authorization protocols.

  • True
  • False

Module quiz: Cloud computing and networking Quiz Answers

Question 1)
Microsoft has its very own cloud platform called Azure, which includes Azure, virtual machine, storage, network, security services, and many more. What are the advantages of the Azure cloud platform? Select all that apply.

  • Scalability
  • Easy to manage
  • Local access
  • Worldwide access

Question 2)
Identify two disadvantages of cloud computing for large businesses.

  • Scalability
  • Cost
  • Dependence on Internet connectivity
  • Remote access

Question 3)
Within a virtual server environment, type 1 hypervisors run directly on the physical hardware, and they’re called bare metal. What is the type 2 hypervisor known as?

  • Cloud
  • Remote
  • Hosted

Question 4)
What virtual machine type offers a higher ratio of CPU resources for high-performance computing requirements?

  • Burstable
  • Compute-optimized
  • Memory optimized

Question 5)
What cloud capabilities can use intelligence to automate processes? Select all that apply.

  • Artificial Intelligence (AI)
  • Databases
  • Servers
  • Machine learning (ML)

Question 6)
What is the simplest type of AI that is designed to react to specific inputs and perform specific tasks?

  • Reactive machines
  • Narrow AI
  • Limited memory AI
  • General AI

Question 7)
Renting services or equipment and spreading cost throughout the year is known as what cost model?

  • CapEx
  • Top up
  • OpEx

Question 8)
True or false: Microsoft provide many different XaaS solutions with products from Microsoft 365 and Microsoft Azure.

  • True
  • False

Question 9)
True or false: SaaS is deemed the most complete cloud offering, with the least amount of responsibility for the customer.

  • True
  • False

Question 10)
True or false: When implementing SaaS, bandwidth is critical to assure a business can use it.

  • True
  • False

Question 11)
When deciding how to create virtual machines, you must first decide what type of hypervisor you will use. What are the types? Select all that apply.

  • Bare metal
  • Cloud
  • Remote
  • Hosted

Question 12)
____________(a) is the simplest type of AI that is designed to react to specific inputs and perform specific tasks and ___________(b) is theoretical type of AI in that could be capable of learning, reasoning and problem solving in the future?

  • (a) Reactive machines, (b) General AI
  • (a) Narrow AI, (b) Theory of mind AI
  • (a) General AI, (b) Reactive machines
  • (a) Narrow AI, (b) General AI

Question 13)
True or false: When purchasing hardware or services you can choose to pay everything upfront which is known as OpEx, or spread the cost over a period of time, known as CapEx.

  • True
  • False

Question 14)
True or false: Microsoft provide many different XaaS solutions with products from Microsoft 365 and Microsoft Azure.

  • True
  • False

Question 15)
What model of XaaS gives the customer the most responsibility and control when using cloud services?

  • PaaS
  • NaaS
  • IaaS

Question 16)
Azure, Microsoft’s cloud platform, offers many different services. Identify three of them.

  • Azure Storage services
  • Azure Virtual Machines services
  • Azure Printing services
  • Azure Security services

Question 17)
What virtual machine type is best-suited to real-time big data processing and data analytics?

  • Memory-optimized
  • General purpose
  • Compute-optimized

Question 18)
What cloud capability can perform tasks that would typically require human intelligence?

  • Servers
  • Artificial Intelligence (AI)
  • Machine learning (ML)

Question 19)
True or false: Reactive machines is the simplest type of AI that is designed to react to specific inputs and perform specific tasks.

  • True
  • False

Question 20)
Microsoft can provide many different XaaS solutions. Which Microsoft products are classified as IaaS, PaaS or SaaS? Select all that apply.

  • Microsoft Azure is PaaS, IaaS or SaaS
  • Microsoft 365 is SaaS
  • Microsoft Teams is SaaS
  • Microsoft 365 is PaaS

Question 21)
What type of XaaS gives the customer everything they need to develop software or applications straight away?

  • PaaS
  • NaaS
  • IaaS

Question 22)
When implementing SaaS, it is critical for a business to consider if its internet bandwidth allow the SaaS solution to run optimally and allow enough users to access it. What other factors should be considered? Select all that apply.

  • Server hardware
  • Training
  • Support
  • Operating systems

Question 23)
True or false: Microsoft has its very own cloud platform called Azure, with several services, including virtual machines, storage, network, security services, and many more.

  • True
  • False

Question 24)
What cloud capability can learn from data by identifying patterns within that data to determine trends?

  • Servers
  • Artificial Intelligence (AI)
  • Machine learning (ML)

Question 25)
Identify two advantages of cloud computing for large businesses.

  • Improved collaboration
  • You control all the security around the hardware
  • Easy to setup
  • Disaster recovery

Question 26)
What virtual machine type is better suited to VMs that will have variable or occasional spikes in demand?

  • GPU-optimized
  • Compute-optimized
  • Burstable

Question 27)
When purchasing hardware or services a business can choose to pay everything upfront or spread the cost over a period of time. What cost models explain these methods of expenditure? Select all that apply.

  • Capex
  • Top up
  • Opex
  • Loan

Question 28)
Microsoft 365 provides a suite of applications. What type of XaaS is it?

  • PaaS
  • SaaS
  • IaaS
  • NaaS

Question 29)
True or false: For large businesses using the cloud is always cost-effective.

  • True
  • False

Self-review: Digital transformation Quiz Answers

Overview

Question 1)
Did you find a SaaS solution to automate the accounting functions for Sam’s Scoops?

  • Yes
  • No

Question 2)
Did you find a SaaS solution to allow Sam’s Scoops to better communicate with their suppliers and hold meetings?

  • Yes
  • No

Question 3)
Did you find a SaaS solution for a website that will promote Sam’s Scoops but can also be developed further to support online sales?

  • No
  • Yes

Question 4)
Which of the following statements best describes Software as a Service (SaaS)?

  • SaaS refers to the delivery of software applications over the internet.
  • SaaS refers to the installation of software applications on individual computers
  • SaaS refers to the delivery of software applications over a local network.
  • SaaS refers to the use of software applications without an internet connection.

Question 5)
Did you suggest cloud technology from Microsoft Azure that could benefit Sam’s Scoops?

  • Yes
  • No

Question 6)
You are a small business owner considering migrating your on-premises infrastructure to the cloud. Which of the following benefits would likely be relevant to your decision? Select all that apply.

  • Improved scalability.
  • Cost savings.
  • Greater control over hardware.
  • Increased physical security.

Question 7)
Did you suggest network technology that will improve the security of Sam’s Scoops network?

  • Yes
  • No

Question 8)
Which of the following network technologies provides an additional layer of security by inspecting and filtering incoming network traffic based on predefined rulesets?

  • Switch
  • Router
  • Firewall

Question 9)
Did you produce a network diagram that displays new cloud services and any security device(s) that you have suggested?

  • Yes
  • No

Question 10)
Which of the following benefits can be derived from using a network diagram? Select all that apply.

  • Enhancing network performance.
  • Identifying potential single points of failure.
  • Automating network management tasks.

Course quiz: Introduction to Networking and Cloud Computing Quiz Answers

Question 1)
True or False: The internet is considered to be a large MAN.

  • True
  • False

Question 2)
What protocol uses subnet masks and default gateways to address and enable devices to communicate across a network and the internet?

  • DNS
  • IP
  • UDP
  • TCP

Question 3)
A logical and a physical star topology is created when connecting multiple devices with a ______.

  • Firewall
  • Switch
  • Server
  • Hub

Question 4)
True or False: IPv4 addresses are 128 bits long and IPv6 addresses are 32 bits long.

  • True
  • False

Question 5)
When using a Windows PC, what do you need to type in the command application to get the device’s IP address?

  • netstat -a
  • ipconfig
  • ipaddress

Question 6)
What is the topology used in this logical network diagram?

  • Mesh
  • Ring
  • Bus
  • Star

Question 7)
In a small hybrid network, a wireless router can also often act as a what?

  • Hub
  • Server
  • Firewall

Question 8)
An on-premise setup is when a data center is owned and used by one company inside the same building as the users. But what cloud type would this be classified as?

  • Private cloud
  • Multi-cloud
  • Public cloud
  • Hybrid cloud

Question 9)
When a data center is owned and used by one company it’s known as a private cloud setup. What is it called if the users are also on the same site?

  • Multi-cloud
  • On-premise
  • Hybrid cloud

Question 10)
True or False: An IoT device needs little or no human interaction or intervention, but it needs a way to communicate over the internet to use back-end services provided by the cloud.

  • True
  • False

Question 11)
Which layers are missing from this diagram of the OSI model? Select all that apply.

  • Network access layer
  • Internet layer
  • Presentation layer
  • Data link layer

Question 12)
True or false: The network access layer from the TCP/IP suite combines the network and physical layers of the OSI model.

  • True
  • False

Question 13)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops and both operate at the network access layer of the TCP/IP suite.

  • True
  • False

Question 14)
Which port number range do the most common protocols like HTTP, HTTPS and DNS use?

  • 0 -1023
  • 1024- 49151
  • 49152 – 65565

Question 15)
What information can you get with the netstat -a command on a Windows PC and an Apple Mac? Select all that apply.

  • Protocols used in open sessions
  • Amount of data sent in open sessions
  • Used devices
  • Current open sessions

Question 16)
A DNS server translates domain names to IP addresses. To do this it needs to look up a website name and its respective IP address in a ______.

  • Lookup record
  • Request record
  • SRV record
  • Record

Question 17)
What information can you find in a typical log file? Select all that apply.

  • Event description
  • Username
  • Timestamp
  • Password

Question 18)
VPN, SSH, and RDP are all types of remote access protocols, that can be used to gain access to different devices but ____ can give remote users access to a whole network whilst also encrypting traffic.

  • SSH
  • RDP
  • VPN

Question 19)
Steps 1 and 3 of the DHCP process have been left out on the diagram below. What are these steps? Select all that apply.

  • Step 1: DHCP Discover
  • Step 3: DHCP Reply
  • Step 3: DHCP Request
  • Step 1: DHCP SYN

Question 20)
True or false: Fingerprint scanners and facial recognition are examples of multi-factor authentication.

  • True
  • False

Question 21)
To create a strong password, it is recommended to use at least 8 characters. What are other recommendations for strong passwords? Select all that apply.

  • Use special characters and symbols.
  • Use uppercase and lowercase letters.
  • Use more than one phrase.

Question 22)
There are security risks when connecting to a private network via a public wireless network. How does a VPN reduce the risk of attackers eavesdropping on the connection?

  • The VPN connection encrypts the traffic.
  • The VPN only allows you to connect to secure networks.
  • The VPN sets up a password between your device and the public Wi-Fi.

Question 23)
Identify two advantages of cloud computing.

  • Complete control
  • Compatibility
  • Remote access
  • Scalability

Question 24)
What Azure service includes Power BI, Azure Data Lake and Azure Machine Learning?

  • Azure Analytics
  • Azure Insights
  • Azure Bot

Question 25)
AI and machine learning can be used to make decisions based on patterns identified, but how can they help with business processes?

  • Create business processes
  • Identify business processes
  • Automate business processes

Question 26)
Which three main capabilities in Microsoft Azure enable developers to quickly create and deploy applications? Select all that apply.

  • Mobile apps
  • API apps
  • Web apps
  • Messaging apps

Question 27)
Which XaaS service supports developers to develop straight away without needing to set up an operating system?

  • IaaS
  • SaaS
  • PaaS

Question 28)
Microsoft 365 is an example of a____(a) which provides many different applications straight to the end user. This combination of applications is known as a _____(b).

  • (a) SaaS, (b) Suite
  • (a) Suite, (b) SaaS
  • (a) Application, (b) PaaS
  • (a) PaaS, (b) application

Question 29)
The shared responsibility model determines who takes responsibility for different parts of the different XaaS, between the ______ and the _____. Select all that apply.

  • Cloud provider
  • Network administrator
  • Customer
  • Internet service provider

Question 30)
What firewall type is desirable because it combines firewall functions and can perform deep packet inspection?

  • Next-generation firewall
  • Application-layer firewalls
  • Stateful firewalls
  • Packet filtering firewalls

Question 31)
What network type would you associate with the internet?

  • MAN
  • WAN
  • LAN
  • PAN

Question 32)
The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another. The address versions used are either _____ or _____. Choose all that apply.

  • IPv6
  • Ipv3
  • IPv5
  • IPv4

Question 33)
When a switch is used to connect multiple devices together it creates a _____ and _____ star topology. Select all that apply.

  • Logical
  • Mesh
  • Bus
  • Physical

Question 34)
IPv4 is only 32 bits long providing over 4 billion addresses. But because the available IPv4 addresses have been exhausted Ipv6 was introduced. How many bits are used to make up IPv6 addresses?

  • 64
  • 48
  • 128

Question 35)
True or False: Wireless routers are used in many homes around the world, providing network interconnectivity, wireless connectivity and firewall services.

  • True
  • False

Question 36)
What three components are needed to make up an IoT (Internet of Things) device? Select all that apply.

  • Device or sensor
  • Back-end services
  • Communication capability
  • Local storage

Question 37)
Which layer in the TCP/IP suite performs the same function as the data link and physical layers of the OSI model?

  • Internet layer
  • Transport layer
  • Network access layer
  • Application layer

Question 38)
Which two network access layer protocols from the TCP/IP suite are being used on this network from Sam’s Scoops?

Network diagram

  • Cellular
  • Satellite
  • Ethernet
  • Wi-Fi

Question 39)
Which common protocols use the port range numbers 0 – 1023? Select all that apply.

  • HTTP
  • DNS
  • HTTPS
  • SIP

Question 40)
True or false: The netstat -a command can be used on both a Windows PC and an Apple Mac to identify sessions and protocols in use on that device.

  • True
  • False

Question 41)
True or false: Log files are records of events committed to a file in a list format. They can include different types of information about events that happened at a particular time.

  • True
  • False

Question 42)
VPN, RDP and SSH are all classified as what type of protocol?

  • Messaging
  • Internet
  • Network management
  • Remote access

Question 43)
Fingerprint scanners and facial recognition technology are examples of what type of authentication method?

  • Password-based
  • Certificate-based
  • Biometric
  • Multi-factor

Question 44)
True or false: A strong password should be at least 8 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters or symbols. Passwords should also be changed regularly.

  • True
  • False

Question 45)
You can become a target for cyberattacks when you use a public wireless network. How can you mitigate this potential threat?

  • Change your passwords every time after you use a public network.
  • Keep changing the Wi-Fi network you are connected to.
  • Use passwords with special characters and symbols.
  • Use a VPN connection.

Question 46)
Cloud computing offers scalability and remote access. Another benefit is that it is cost-effective because it uses a __________ pricing model.

  • Pay in full
  • Fixed
  • Pay-as-you-go

Question 47)
_____________ is a suite of tools that includes Power BI, Azure Data Lake, and Azure Machine Learning. This suite can collect and analyze customer data, and businesses use it to better understand customer needs and preferences.

  • Azure Insights
  • Azure Analytics
  • Azure Bot

Question 48)
_____ benefits from PaaS because they do not need to worry about the infrastructure or operating system setup and can start working on applications straight away.

  • End users
  • Network engineers
  • Developers

Question 49)
Microsoft 365 is a suite of applications. Which XaaS does it best represent?

  • SaaS
  • IaaS
  • PaaS

Question 50)
Which XaaS gives the cloud provider more responsibility than the user in the shared responsibility model?

  • NaaS
  • IaaS
  • SaaS
  • PaaS

Question 51)
Next-generation firewalls perform many of the same functions as stateful firewalls but include additional functions from other types of firewalls. What are these functions? Select all that apply.

  • Deep packet inspection
  • Packet-filtering
  • VPN support
  • RDP support

Question 52)
True or False: The internet protocol (IP) is used to assign addresses to devices across a network so devices can be located and communicate with one another.

  • True
  • False

Question 53)
What is the topology used in this logical network diagram?

  • Bus
  • Star
  • Ring
  • Mesh

Question 54)
When building a hybrid network, what device can be used to both interconnect different networks and provide wireless connectivity?

  • A wireless router
  • A switch
  • A firewall
  • A modem

Question 55)
Wi-Fi and Ethernet are two protocols being used in this network diagram of Sam’s Scoops, but what layer of the TCP/IP suite do they operate at?

  • Transport
  • Physical layer
  • Application
  • Network access layer

Question 56)
True or false: The SIP protocol comes from the well-known port number range between 0 and 1023.

  • True
  • False

Question 57)
To create a strong password, what is the minimum number of characters that you’re recommended to use?

  • 5
  • 10
  • 8
  • 6

Question 58)
True or false: When using a public wireless network to connect to a secured network like a business network, you can mitigate security threats by changing your passwords every time after you use a public wireless network.

  • True
  • False

Question 59)
Azure Analytics is a suite made up of which three tools? Select all that apply.

  • Azure Machine Learning
  • Azure Data Lake
  • Azure Insights
  • Power BI

Question 60)
App services within Microsoft Azure provide three main capabilities, web apps, mobile apps, and API apps. These services are typically used by developers.

  • False
  • True

Question 61)
True or false: The SaaS service is the best way for a developer to get started straight away without needing to set up an operating system.

  • True
  • False

Question 62)
True or false: Proxy server firewalls perform many of the same functions as stateful firewalls but they also have additional functions such as packet filtering and VPN support.

  • True
  • False

Question 63)
When a switch is used to connect multiple devices together it creates the same physical and logical topology which is the _________ topology?

  • Bus
  • Ring
  • Mesh
  • Star

Question 64)
What kind of device or sensor operates with little or no human interaction or intervention and communicates via the internet to use back-end services provided by the cloud?

  • IoT
  • Laptop
  • Printer
  • Router

Question 65)
Which layers are missing from this diagram of the OSI model? Select all that apply.

Diagram of the OSI model with the titles of layers 3 and 4 masked out.

  • Network layer
  • Internet layer
  • Transport layer
  • Network access layer

Question 66)
Which two layers in the OSI model perform the same functions as the network access layer in the TCP/IP suite? Select all that apply.

  • Data link layer
  • Transport layer
  • Physical layer
  • Application layer

Question 67)
True or false: A DNS server translates website names to IP addresses and stores different information in the form of records.

  • True
  • False

Question 68)
Which file format includes a timestamp, event description, username, and other information, and is used to store event records in a list format?

  • Security file
  • Log file
  • Event file

Question 69)
Remote access technologies can help increase productivity and help save costs for a business. What protocols enable remote access? Select all that apply.

  • RDP
  • SSH
  • SMTP
  • VPN

Question 70)
AI and machine learning can be used to automate processes and make decisions based on patterns identified.

  • False
  • True

Question 71)
App services within Microsoft Azure provide three main capabilities web apps, mobile apps, and API apps but whom are these services intended to help?

  • Network engineer
  • Developers
  • End users

Question 72)
Which Microsoft SaaS provides a suite of applications?

  • Microsoft Teams
  • Microsoft 365
  • Microsoft Word

Question 73)
IPv4 is ____(a) bits long providing over 4 billion addresses, which have now been exhausted. IPv6 is its replacement and uses ___(b) bits, doubling the number of addresses for every additional bit used.

  • (a) 64, (b) 128
  • (a) 16, (b) 32
  • (a) 32, (b) 128

Question 74)
A DNS server translates website names to IP addresses but what type of record stores details of the services supported by that domain?

  • A record
  • SRV record
  • Request record
  • Lookup record

Question 75)
What process is demonstrated by the diagram below?

DHCP IP assignment process

  • IP address to name translation
  • Dynamic IP address assignment
  • Static IP address assignment
  • Name to IP address translation

Question 76)
Identify two disadvantages of cloud computing.

  • Limited control
  • Compatibility issues
  • Full control

Question 77)
What is the model used to identify the responsible party for managing various XaaS components between the cloud provider and the customer?

  • Management model
  • Management responsibility model
  • Responsible model
  • Shared responsibility model

Question 78)
The internet is the biggest ___, allowing for communication across the world.

  • LAN
  • MAN
  • WAN
  • PAN

Question 79)
True or False: On a Windows PC you use the ipconfig command to find the IP address, but on an Apple Mac you use the ipconfig getifaddr en0 command.

  • True
  • False

Question 80)
When a data center is owned and used by one company it is referred to as a ___________(a). If this cloud setup is also on the same site as the users it’s _________(b).

  • (a) Private cloud, (b) Off-premise
  • (a) Private cloud, (b) On-premise
  • (a) Public cloud, (b) On-premise

You might also like: Intro to Computers and OS Security Quiz Answers + Review

My Review: Intro to Networking and Cloud Computing

I recently completed a course focused on Networking and Cloud Computing, which is part of the Microsoft Cybersecurity Analyst Professional Certificate series on Coursera. This course is designed as a beginner-friendly introduction to key concepts in networking and cloud environments — and it absolutely delivers on that promise. Spread across five modules, the course covers fundamental topics like network infrastructure, monitoring, network security, cloud computing basics, virtual machines, and cloud services.

It’s especially useful for those preparing for the Microsoft SC-900 exam, which can lead to the Security, Compliance, and Identity Fundamentals Certification. I found the explanations to be clear and accessible, even for those with no prior IT experience. The course strikes a great balance between technical depth and simplicity, making it an ideal stepping stone for anyone looking to build a foundation in cybersecurity and cloud systems. Overall, it’s a valuable addition to any beginner’s learning path in tech.

Category: Coursera Hub

Post navigation

← Intro to Computers and OS Security Quiz Answers + Review
Building a Dark Mode Toggle with Alpine.js and Tailwind CSS →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Notice

Hey guys! Need a Google Drive Direct Download Link Generator? I made a simple tool that does just that. 🚀
Convert any shared Drive link into a direct download link instantly.
Try it out now: https://niyander.com/projects/tools/gdrive/
Let me know your thoughts!

Notice

Hi everyone! I've built a collection of 98+ CSS Box-Shadow Examples for developers and designers! 🎨
Click on any card to copy the shadow — super handy for your projects.
Explore them all here: https://niyander.com/projects/tools/box-shadow/
Hope you find it useful!

Notice

Hey folks! Excited to share my new tool — an All-in-One Social Media Downloader! 📥
Download videos, photos, and audio from TikTok, YouTube, Instagram, Facebook, and more.
Check it out here: https://niyander.com/projects/tools/sm/
Your feedback is welcome!

Notice

Hey friends! I just launched a free AI Background Remover called Panda AI! 🐼
Easily remove backgrounds from images with just one click.
Try it out now: https://niyander.com/projects/tools/bg/
Let me know what you think!

May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Apr    

About

Greetings, Hey i am Niyander, and I hail from India, we strive to impart knowledge and offer assistance to those in need.

  • Alpine.js Components
  • Android
  • Bootstrap
  • Coursera Hub
  • Genshin Impact News
  • Jobs and Internship
  • Uncategorized

Hot Topics

  • Microsoft Azure Data Scientist Associate (DP-100) Quiz Answers + Review
  • Prepare for DP-100: Data Science on Microsoft Azure Exam Answers + Review
  • Genshin Impact Version 5.6 redeem codes
  • More Software Engineering Jobs in Japan for Expats – April 2025 Edition
© 2025 Niyander Tech | Powered by Minimalist Blog WordPress Theme