Introduction to Networking and Cloud Computing Coursera Quiz Answers
In this article i am gone to share Introduction to Networking and Cloud Computing Coursera Quiz Answers with you..
Enrol Link: Introduction to Networking and Cloud Computing
Introduction to Networking and Cloud Computing Coursera Quiz Answers
Week 1 Quiz Answer
Knowledge check: Understanding types and topologies Quiz Answer
Question 1)
What network type connects devices in a small area like a home or office?
- WAN (wide area network)
- PAN (personal area network)
- LAN (local area network)
Question 2)
Wireless local area networks (WLANs) have many advantages, and being flexible is just one, but what are the drawbacks of this network type?
- Limited range and security risks
- Supports very few users and devices
- High installation costs and difficulty to install
Question 3)
A network topology determines how devices are connected and how data travels. What network topology is created when a switch is used to connect multiple devices?
- A bus topology
- A ring topology
- A star topology
- A tree topology
Question 4)
True or False: A physical topology focuses on data paths across a network.
- True
- False
Question 5)
During the data transmission process packets are sent over the network in what format?
- As headers
- As frames
- As packets
Knowledge check: IP addressing Quiz Answer
Question 1)
What is used to identify the network and the host portion of an IPv4 address?
- Subnet mask
- IP default gateway
- Prefix
Question 2)
What three different traffic types does IPv6 use? Select all that apply.
- Unicast
- Anycast
- Multicast
- Broadcast
Question 3)
What subnet mask identifies a class A address?
- 255.0.0.0
- 255.255.255.0
- 255.255.0.0
Question 4)
True or False: Dynamic IP address assignment commonly known as the Dynamic Host Configuration Protocol, only supported by IPv4.
- True
- False
Visit this link: Module quiz: Computer networking Quiz Answers
Week 2 Quiz Answer
Knowledge check: Infrastructure Quiz Answer
Question 1)
What network device protects the network from unwanted incoming traffic?
- A switch
- A modem
- A router
- A firewall
Question 2)
Please identify the three main cloud types.
- Public cloud
- Secure cloud
- Hybrid cloud
- Private cloud
Question 3)
True or False: Virtual private networks (VPNs) securely connect sites and remote users to the cloud.
- True
- False
Question 4)
The internet is made up of lots of different networks, but what is needed to interconnect them all?
- Internet service providers (ISPs)
- Modems
- HTML
- Firewalls
Question 5)
Identify examples of Internet of Things (IoT). Select all that apply.
- A connected sensor monitoring the temperature of the oven
- A smartwatch measuring your heart rate
- A Smart Printer
- A router
Self-review: Expanding the network layout Quiz Answer
In the Expanding the network exercise you completed you had to extend Sam’s Scoops’ physical network topology to demonstrate what it would be like if wireless capabilities were added to the network. To do so you had to complete three tasks:
Identify the additional equipment needed
Demonstrate the expanded network topology
Identify two protocols that support the network at the network access layer of the TCP/IP suite.
Now you can use the following questions to make sure that you understood and executed the tasks correctly.
Question 1)
What device in your network solution provides Wi-Fi access to the network?
- Router
- Wireless router
- Switch
Question 2)
Does your solution include a physical connection between the switch and the Wi-Fi device you have introduced?
- Yes
- No
Question 3)
How many mobile devices have you included in your network solution?
- 0
- 2
- 1
Knowledge check: Network communication models Quiz Answer
Question 1)
What is the purpose of the application layer in the OSI model?
- To transmit data over a network
- To manage network traffic
- To control the flow of data
- To provide end-user services
Question 2)
What layer of the OSI model is responsible for converting data into a format that can be transmitted over a network?
- Transport layer
- Presentation layer
- Application layer
- Session layer
Question 3)
Which layer of the TCP/IP model is responsible for addressing and routing?
- Internet layer
- Application layer
- Network access layer
- Transport layer
Question 4)
Which layer of the TCP/IP model is responsible for establishing a connection between two devices on a network?
- Internet layer
- Transport layer
- Application layer
- Network access or data link layer
Question 5)
What does TCP in the TCP/IP model stand for?
- Transmission Control Protocol
- Telecommunication & Internet Protocol
- Transport Control Protocol
- Telecommunication Control Protocol
Knowledge check: Network traffic monitoring Quiz Answer
Question 1)
If the recursive DNS server cannot resolve your DNS query, what server does it goes to next?
- Authoritative DNS server
- Top-level DNS server
- Root domain server
Question 2)
What type of DNS attack gives the user false DNS server details, pointing them toward the wrong DNS server?
- DNS flood attack
- DNS tunneling
- DNS hijacking
Question 3)
True or False: Network traffic monitoring involves packet capturing or flow analysis as data sources.
- True
- False
Question 4)
Which metrics are used to track network performance and health? Select all that apply.
- Latency
- Bandwidth usage
- Speed
- Packet loss
Question 5)
What important headings are present in a log file? Select all that apply.
- Timestamp
- Event description
- Log level
- Log answer
Visit this link: Module quiz: Network devices and protocols Quiz Answers
Week 3 Quiz Answer
Knowledge check: Network client and server Quiz Answer
Question 1)
True or False: DHCP is a protocol that assigns IP addresses and other network configuration settings to devices on a network.
- True
- False
Question 2)
What is a server in client-server networking?
- A device that controls access to the internet
- A computer that requests services from another computer
- A computer that provides services to other computers
- A computer that processes and stores data locally
Question 3)
What is the role of VPN in remote access?
- To enhance the security of the connection
- To block remote access
- To provide physical access to the network.
- To speed up the connection speed
Question 4)
Which of the following are the purposes of using DHCP? Select all that apply.
- Increasing network security
- Automate the IP address assignment process
- Simplifying network management
- Avoid IP address conflicts
Question 5)
What type of server model is it when a device can act as both a client and a server?
- Publish-subscribe
- Peer-to-peer
- Request-response
- None of the above
Knowledge check: Authentication and authorization Quiz Answer
Question 1)
What is the difference between authentication and authorization?
- Authentication and authorization are the same thing
- Authentication is the process of granting access to resources based on the user’s identity, while authorization is the process of verifying the identity of a user
- Authentication and authorization have no relation to each other
- Authentication is the process of verifying the identity of a user, while authorization is the process of granting access to resources based on the user’s identity.
Question 2)
What do the terms “Guest access”, “User access”, “Admin access” refer to?
- Authorization protocol
- Tiers of authorization
- Access control
- Authentication protocol
Question 3)
True or False: An Intranet can work without an internet connection.
- True
- False
Question 4)
Which of the following are valid security protocols for wireless routers? Select all that apply.
- WEP
- WPA2
- WES
- RSA
Question 5)
In a hospital, there is a collection of patient records. Nurses have access to some of these files, but doctors can access all of the files. And Human Resource staff cannot access any of the files.
Within this scenario which of the following authorization models is being used?
- ABAC
- MAC
- RBAC
- DAC
Knowledge check: Firewalls and security tools Quiz Answer
Question 1)
What firewall zone can be assigned a trust level of 100?
- Private, inside network
- DMZ
- Internet, outside
Question 2)
What firewall type checks the status of TCP connections before data is exchanged?
- Proxy server
- Stateful
- Circuit-level
- Packet-filtering
Question 3)
Identify some of the most common network attacks. Select all that apply.
- DoS and DDoS
- Phishing
- MITM
- Ransomware
Question 4)
Some firewall threats are within your control to prevent them from happening. Identify all such threats below. Select all that apply.
- Lack of documentation
- Outdated firewall software
- DDoS attack
- Malicious insider
Question 5)
True or False: Next-generation firewalls (NGFW) combine many functions of the firewall types and can perform deep packet inspection.
- True
- False
Visit this link: Module quiz: Network security Quiz Answers
Week 4 Quiz Answer
Knowledge check: Introduction to Azure Quiz Answer
Question 1)
Which Azure service can be used for creating and managing virtual machines for small businesses?
- Azure Analytics
- Azure Virtual Machines
- Azure Backup
- Azure Bot Service
Question 2)
Which Azure service can be used for storing and managing data for small businesses?
- Azure Virtual Machines
- Azure Analytics
- Azure Storage
- Azure Bot Service
Question 3)
Which Azure service can be used for developing and deploying chatbots for small businesses?
- Azure Bot Service
- Azure Analytics
- Azure Storage
- Azure Virtual Machines
Question 4)
Which Azure service can be used for email, calendaring, and productivity tools for small businesses?
- Azure Analytics
- Azure Bot Service
- Azure Virtual Machines
- Microsoft 365
Question 5)
Which Azure service can be used for analyzing and visualizing data for small businesses?
- Azure Analytics
- Azure Virtual Machines
- Azure Storage
- Azure Bot Service
Knowledge check: Virtual environments Quiz Answer
Question 1)
True or False: Hypervisors are essential for creating virtual servers, which are also known as virtual machines.
- True
- False
Question 2)
Which of the following is true about type 1 hypervisors? Select all that apply.
- They provide a high level of security by isolating virtual machine partitions
- They are installed on top of an existing operating system.
- They are designed for desktop virtualization and testing.
- They are more efficient in resource sharing than type 2 hypervisors
Question 3)
Which of the following statements about Azure Spot Instances are true? Select all that apply.
- They can be used to run workloads that are not time sensitive
- They are significantly discounted compared to regular VMs
- They are great for mission-critical applications
- They are good for production applications
Question 4)
Based on their resource allocation which of the following virtual machines can be purchased from the cloud providers based on their resource allocations? Select all that apply.
- Burstable virtual machines
- Operating system-optimized virtual machines
- Memory-optimized virtual machines
- Network-optimized virtual machines
Question 5)
Which of the following statements about the remote app streaming feature of Microsoft Azure virtual desktop are true? Select all that apply.
- It requires a separate virtual desktop for each remote app
- Remote apps cannot be used to print on client machines
- It supports USB device redirection
- It allows users to run individual applications remotely without accessing the full desktop
Knowledge check: Cloud services Quiz Answer
Question 1)
What are the core components of the cloud computing model?
- Artificial intelligence and machine learning
- Azure Virtual Machines, App Services, and Container Instances
- Servers, storage, databases, networking, software, analytics, and intelligence
Question 2)
What is an example of a real-life application of cloud analytics?
- A company using the cloud to connect multiple offices
- An online retail store using AI to make product recommendations to users
- An online shopping website using the cloud to identify customer buying trends
- A small business using the cloud to deploy their website
Question 3)
What is the simplest type of AI?
- Narrow AI
- General AI
- Reactive machines
Question 4)
What is an example of a real-life application of cloud storage?
- A small business using the cloud deploying a website
- An online retail store using the cloud to make product recommendations
- A retail store using the cloud to manage its inventory
- A company using the cloud to identify customer buying trends
Question 5)
Which statement best describes Azure Cognitive Services?
- A cloud-based service used to store customer orders and manage inventory
- A cloud-based service used to create chatbots
- A cloud-based service that provides secure storage for all kinds of data
- A cloud-based service that allows developers to build intelligent applications
Knowledge check: X as a Service Quiz Answer
Question 1)
What XaaS solution gives users the most control?
- SaaS
- IaaS
- PaaS
Question 2)
What cost model does a company use if it rents cloud services and pays for them monthly?
- Pay in full
- OpEx
- CapEx
- Pay-as-you-go
Question 3)
True or False: When comparing all the XaaS services, a good model to use is the shared responsibility model to compare what the provider will cover and how much effort and experience are required from the customer.
- True
- False
Question 4)
Which XaaS model requires the least amount of technical knowledge?
- SaaS
- IaaS
- PaaS
Question 5)
True or False: Software suites isolate applications from one another, keeping them independent.
- True
- False
Visit this link: Module quiz: Cloud computing and networking Quiz Answers
Week 5 Quiz Answer
Visit this link: Self-review: Digital transformation Quiz Answers
Visit this link: Course quiz: Introduction to Networking and Cloud Computing Quiz Answers
Week 1 Updated Answers:
1. According to the US National Institute of Standards and Technology (NIST) definition of “cloud computing,” what is the meaning of the statement “a shared pool of configurable computing resources”?
Networks, servers, storage, applications, and services. Correct
Leveraging cloud services over the open internet on hardware owned by the cloud provider. Incorrect
Five essential characteristics, three deployment, and three service models. Incorrect
Data security associated with data loss or unavailability causing business disruption. Incorrect
2. What tasks do hypervisors accomplish?
Enable multiple operating systems to run alongside each other and separate VMs logically Correct
Scale on demand to support fluctuating workloads Incorrect
Fluctuates workloads and facilitates access to mainframes Incorrect
Facilitate access to mainframes for multiple users to access the same data storage layer Incorrect
3. Which key considerations drive an organization’s selection of cloud computing when considering expenditure for off-the-shelf software and investments in upgrades?
Speed and productivity Incorrect
Risk exposure Incorrect
Infrastructure and workloads Incorrect
Software as a service and development platforms Correct
4. Which of the following statements describes a benefit of cloud computing?
Data security associated with loss or unavailability of data Incorrect
Business continuity Incorrect
Lack of standardization in how the constantly evolving technologies integrate Incorrect
Hardware failures do not result in data loss because of backups maintained on the network Correct
5. Which service provider provides one of the largest cloud-based data management platforms?
Salesforce Incorrect
Oracle Cloud Correct
Alibaba Cloud Incorrect
Amazon Web Services Incorrect
6. Which service provider uses its cloud platform internally for their end-user products, such as Search and app engines that automatically allocate and de-allocate resources to handle demand?
Microsoft Azure Incorrect
Oracle Cloud Incorrect
Google Cloud Platform (GCP) Correct
SAP Incorrect
7. According to the International Data Corporation (IDC), what is that crucial ability that will make cloud computing essential for businesses to succeed, sustain, and compete in today’s markets?
Cognitively enabled workflows Incorrect
Data-driven decisions Correct
Multi-cloud infrastructures Incorrect
Applied exponential technologies such as Al, Automation, loT, and Blockchain Incorrect
8. Why did American Airlines require a new technology platform?
Removal of barriers to innovation Incorrect
Establishment of a scalable hosting platform for low-latency delivery Incorrect
Requirement for better customer service Correct
Acceleration of growth Incorrect
9. Select the answer that best describes how does Cloud Computing helps IoT devices?
Provides the resources to store and process the data produced by loT devices and users. Correct
Provides a fixed physical location for the data collected from loT devices Incorrect
Stores data on an encrypted physical drive Incorrect
Draws insights from data collected from the loT devices and users Incorrect
10. Which of the following denotes the relationship between Blockchain, AI, and cloud?
Blockchain lends trust and transparency to Al by recording the data and variables that go into a decision made in an Al algorithm,
and the cloud provides an immutable network Incorrect
Blockchain provides an immutable network, Al provides distributed computing resources and cloud powers decision-making Incorrect
Blockchain provides the distributed computing resources, Al powers the analytics, and the cloud records the data Incorrect
Blockchain provides a decentralized source of truth, Al powers analytics and decision-making, and the cloud provides globally
distributed computing resources Correct
Benoso Dixiser Thank you..