Introduction to Computers and Operating Systems and Security Coursera Quiz Answers
In this article i am gone to share Introduction to Computers and Operating Systems and Security Coursera Quiz Answers with you..
Enroll link: Introduction to Computers and Operating Systems and Security
Introduction to Computers and Operating Systems and Security Coursera Quiz Answers
Week 1 Quiz Answer
Knowledge check: Elements of the threat landscape Quiz Answer
Question 1)
Which sentence best describes what the threat landscape is?
- The threat landscape relates to the application that is vulnerable to an attack.
- The threat landscape relates to all potential vulnerabilities of an application, the attackers that may be targeting this area, and the attacks that are used.
- The threat landscape relates to all the dangerous exploits that can be performed on an application.
Question 2)
True or False: Ransomware can involve locking someone out of their system.
- True
- False
Question 3)
Which of the following are cybercrime exploits? Select all that apply.
- Denial of Service
- Software
- Trojan
Question 4)
Which of the following password traits would increase the risk of an attacker gaining access to multiple accounts from the same user? Select all that apply.
- Using the same email address and password across all accounts.
- Using a mix of letters, numbers, and special characters.
- Following a pattern for all passwords, like the name of a favorite vacation destination.
Question 5)
With the increased number of people working from home, which practices create more points for potential attackers to enter a business’ internal network? Select all that apply.
- Employees accessing the network with their personal devices, under the practice of bring your own device (BYOD).
- Employees accessing the network with remote access tools.
- Businesses use different security tools for employees working from home.
Knowledge check: Operating systems Quiz Answer
Question 1)
Which of the following statements are true about an Operating System? Select all that apply.
- An operating system provides a user interface.
- An operating system controls hardware access.
- An operating system controls how you browse the internet.
Question 2)
Which of the following are instances of Operating Systems? Select all that apply.
- Time-sharing operating system
- Batch operating system
- Organic operating system
Question 3)
What is the definition of proprietary software?
- Software developed commercially which requires a license for use or distribution.
- Software that has been tailored for a specific purpose.
- Freely available software that can be distributed without licensing issues.
Question 4)
True or False: The OS is responsible for directing hardware.
- True
- False
Question 5)
Where does a Windows OS store the application settings?
- Registry
- Preferences
- CPU
Visit this link: Module quiz: Introduction to computers and operating systems Quiz Answers
Week 2 Quiz Answer
Knowledge check: Servers, storage and backup Quiz Answer
Question 1)
Which one of these server types can host web-based applications?
- Computing server
- File server
- Application server
Question 2)
Which one of the following definitions accurately defines scalability?
- Scalability is having the appropriate infrastructure to grow or shrink depending on the business needs.
- Scalability means that a business continually grows with the infrastructure it has in place.
- Scalability means that a company can diversify its production to meet different challenges.
Question 3)
True or False: As a means of storage, RAM has high durability.
- True
- False
Question 4)
How many copies of the data is advisable in the four-step practical data-saving strategy?
- One
- Four
- Three
- Two
Question 5)
The 3-2-1 storage strategy involves maintaining __copies of data on __different types of media, with at least ___ copy stored off-site.
- Three, two, one
- Two, three, one
- Three, one, two
Knowledge check: Computing environments Quiz Answer
Question 1)
Which of these computing environments is most likely to have the most hardware?
- Commercial cloud-based computing
- Traditional commercial computing
- Personal computing
Question 2)
Which of the following are examples of endpoints? Select all that apply.
- Desktops
- Windows operating system.
- Mobile devices
Question 3)
How can using segregation as a defensive measure better protect your assets?
- Segregation means that even if a hacker breaches the network, the scope for damage is limited.
- Segregation creates more endpoints and confuses a would-be hacker.
- It divides the hacker’s attacks, and so reduces their impact.
Question 4)
True or False: The 3-2-1 backup strategy makes your organization less prone to hacking.
- True
- False
Question 5)
Which computing environment would you expect to have the highest start-up costs?
- Cloud computing
- Traditional commercial computing
- Personal computing
Knowledge check: Maintenance and patching Quiz Answer
Question 1)
What is a zero-day exploit?
- A method used by a hacker to exploit a previously unknown issue.
- A vulnerability in software.
- A method used by a hacker to exploit a known issue.
Question 2)
Which of the following statements on Microsoft’s penetration testing is true?
- The blue team aims to attack while the red team tries to defend the system.
- The red team attacks the blue team using known attacks.
- The blue team aims to defend while the red team attacks inside their own system.
Question 3)
How can segregation as a defensive measure enhance the protection of your assets?
- It divides cyberattacks and reduces the impact.
- Segregation means that even if a hacker breaches the network, the scope for damage is limited.
- Segregation creates more endpoints and confuses a potential hacker.
Question 4)
True or False: A hot patch requires a system reboot before the changes are enacted.
- True
- False
Question 5)
Which of the following statements accurately describes corrective maintenance?
- Maintenance because of a signal notifying potential failure.
- Maintenance that is applied due to an application ceasing to function.
- Maintenance that includes managing the application so that it is up-to-date, secure, and bug-free
Visit this link: Module quiz: Enterprise systems and security Quiz Answers
Week 3 Quiz Answer
Knowledge check: Business software Quiz Answer
Question 1)
In which of these business applications is one most likely to find a Gannt Chart?
- Microsoft Dynamics 365 Project Operation
- Microsoft Dynamics 365 Field Service
- Microsoft Dynamic 365 Marketing
Question 2)
Sam would like to make a presentation to some new investors; which of the following applications is most applicable?
- PowerPoint
- Word
- Excel
Question 3)
True or False: Excel contains templates to assist you in writing a budget.
- True
- False
Question 4)
Which of the following typical business operations can be made easier with business software? Select all that apply.
- Storage
- Billing
- Accounting
Question 5)
What does the acronym CRM refer to?
- Cloud Related Management
- Customer Relationship Management
- Careful Resource Managing
Knowledge check: Email apps Quiz Answer
Question 1)
Which of the following email clients have a desktop application to allow offline email? Select all that apply.
- Outlook
- Thunderbird
- Gmail
Question 2)
Which of the following are examples of spam? Select all that apply.
- Filtering
- Phishing emails
- Email spoofing
Question 3)
Imagine that you have sent an email. Before it reaches the recipient, a protocol first sends it to _________.
- A database
- The cloud
- An email server
Question 4)
Which of the following are acronyms for email-related protocols? Select all that apply.
- SMTP
- MIT
- POP3
Question 5)
Which one of these anti-spam measures only allows messages coming from reputable sources?
- Connection filtering
- Quarantining
- Filtering
Visit this link: Module quiz: Business systems applications Quiz Answers
Week 4 Quiz Answer
Visit this link: Course quiz: Introduction to computers and operating systems, and security Quiz Answers