Coursera Answers

Introduction to Computers and Operating Systems and Security Coursera Quiz Answers

In this article i am gone to share Introduction to Computers and Operating Systems and Security Coursera Quiz Answers with you..

Enroll link: Introduction to Computers and Operating Systems and Security

Introduction to Computers and Operating Systems and Security Coursera Quiz Answers


 

Week 1 Quiz Answer

Knowledge check: Elements of the threat landscape Quiz Answer

Question 1)
Which sentence best describes what the threat landscape is?

  • The threat landscape relates to the application that is vulnerable to an attack.
  • The threat landscape relates to all potential vulnerabilities of an application, the attackers that may be targeting this area, and the attacks that are used.
  • The threat landscape relates to all the dangerous exploits that can be performed on an application.

Question 2)
True or False: Ransomware can involve locking someone out of their system.

  • True
  • False

Question 3)
Which of the following are cybercrime exploits? Select all that apply.

  • Denial of Service
  • Software
  • Trojan

Question 4)
Which of the following password traits would increase the risk of an attacker gaining access to multiple accounts from the same user? Select all that apply.

  • Using the same email address and password across all accounts.
  • Using a mix of letters, numbers, and special characters.
  • Following a pattern for all passwords, like the name of a favorite vacation destination.

Question 5)
With the increased number of people working from home, which practices create more points for potential attackers to enter a businessโ€™ internal network? Select all that apply.

  • Employees accessing the network with their personal devices, under the practice of bring your own device (BYOD).
  • Employees accessing the network with remote access tools.
  • Businesses use different security tools for employees working from home.

 

Knowledge check: Operating systems Quiz Answer

Question 1)
Which of the following statements are true about an Operating System? Select all that apply.

  • An operating system provides a user interface.
  • An operating system controls hardware access.
  • An operating system controls how you browse the internet.

Question 2)
Which of the following are instances of Operating Systems? Select all that apply.

  • Time-sharing operating system
  • Batch operating system
  • Organic operating system

Question 3)
What is the definition of proprietary software?

  • Software developed commercially which requires a license for use or distribution.
  • Software that has been tailored for a specific purpose.
  • Freely available software that can be distributed without licensing issues.

Question 4)
True or False: The OS is responsible for directing hardware.

  • True
  • False

Question 5)
Where does a Windows OS store the application settings?

  • Registry
  • Preferences
  • CPU

 

Visit this link:ย  Module quiz: Introduction to computers and operating systems Quiz Answers

 


 

Week 2 Quiz Answer

Knowledge check: Servers, storage and backup Quiz Answer

Question 1)
Which one of these server types can host web-based applications?

  • Computing server
  • File server
  • Application server

Question 2)
Which one of the following definitions accurately defines scalability?

  • Scalability is having the appropriate infrastructure to grow or shrink depending on the business needs.
  • Scalability means that a business continually grows with the infrastructure it has in place.
  • Scalability means that a company can diversify its production to meet different challenges.

Question 3)
True or False: As a means of storage, RAM has high durability.

  • True
  • False

Question 4)
How many copies of the data is advisable in the four-step practical data-saving strategy?

  • One
  • Four
  • Three
  • Two

Question 5)
The 3-2-1 storage strategy involves maintaining __copies of data on __different types of media, with at least ___ copy stored off-site.

  • Three, two, one
  • Two, three, one
  • Three, one, two

 

Knowledge check: Computing environments Quiz Answer

Question 1)
Which of these computing environments is most likely to have the most hardware?

  • Commercial cloud-based computing
  • Traditional commercial computing
  • Personal computing

Question 2)
Which of the following are examples of endpoints? Select all that apply.

  • Desktops
  • Windows operating system.
  • Mobile devices

Question 3)
How can using segregation as a defensive measure better protect your assets?

  • Segregation means that even if a hacker breaches the network, the scope for damage is limited.
  • Segregation creates more endpoints and confuses a would-be hacker.
  • It divides the hackerโ€™s attacks, and so reduces their impact.

Question 4)
True or False: The 3-2-1 backup strategy makes your organization less prone to hacking.

  • True
  • False

Question 5)
Which computing environment would you expect to have the highest start-up costs?

  • Cloud computing
  • Traditional commercial computing
  • Personal computing

 

Knowledge check: Maintenance and patching Quiz Answer

Question 1)
What is a zero-day exploit?

  • A method used by a hacker to exploit a previously unknown issue.
  • A vulnerability in software.
  • A method used by a hacker to exploit a known issue.

Question 2)
Which of the following statements on Microsoftโ€™s penetration testing is true?

  • The blue team aims to attack while the red team tries to defend the system.
  • The red team attacks the blue team using known attacks.
  • The blue team aims to defend while the red team attacks inside their own system.

Question 3)
How can segregation as a defensive measure enhance the protection of your assets?

  • It divides cyberattacks and reduces the impact.
  • Segregation means that even if a hacker breaches the network, the scope for damage is limited.
  • Segregation creates more endpoints and confuses a potential hacker.

Question 4)
True or False: A hot patch requires a system reboot before the changes are enacted.

  • True
  • False

Question 5)
Which of the following statements accurately describes corrective maintenance?

  • Maintenance because of a signal notifying potential failure.
  • Maintenance that is applied due to an application ceasing to function.
  • Maintenance that includes managing the application so that it is up-to-date, secure, and bug-free

 

Visit this link:ย  Module quiz: Enterprise systems and security Quiz Answers

 


 

Week 3 Quiz Answer

Knowledge check: Business software Quiz Answer

Question 1)
In which of these business applications is one most likely to find a Gannt Chart?

  • Microsoft Dynamics 365 Project Operation
  • Microsoft Dynamics 365 Field Service
  • Microsoft Dynamic 365 Marketing

Question 2)
Sam would like to make a presentation to some new investors; which of the following applications is most applicable?

  • PowerPoint
  • Word
  • Excel

Question 3)
True or False: Excel contains templates to assist you in writing a budget.

  • True
  • False

Question 4)
Which of the following typical business operations can be made easier with business software? Select all that apply.

  • Storage
  • Billing
  • Accounting

Question 5)
What does the acronym CRM refer to?

  • Cloud Related Management
  • Customer Relationship Management
  • Careful Resource Managing

 

Knowledge check: Email apps Quiz Answer

Question 1)
Which of the following email clients have a desktop application to allow offline email? Select all that apply.

  • Outlook
  • Thunderbird
  • Gmail

Question 2)
Which of the following are examples of spam? Select all that apply.

  • Filtering
  • Phishing emails
  • Email spoofing

Question 3)
Imagine that you have sent an email. Before it reaches the recipient, a protocol first sends it to _________.

  • A database
  • The cloud
  • An email server

Question 4)
Which of the following are acronyms for email-related protocols? Select all that apply.

  • SMTP
  • MIT
  • POP3

Question 5)
Which one of these anti-spam measures only allows messages coming from reputable sources?

  • Connection filtering
  • Quarantining
  • Filtering

 

Visit this link:ย  Module quiz: Business systems applications Quiz Answers

 


 

Week 4 Quiz Answer

Visit this link:ย  Course quiz: Introduction to computers and operating systems, and security Quiz Answers