All Coursera Quiz Answers

Test your knowledge: Python and automation Quiz Answer

In this article i am gone to share Coursera Course: Automate Cybersecurity Tasks with Python Week 4 Practice Quiz | Test your knowledge: Python and automation Quiz Answer with you..

Enroll Link:  Automate Cybersecurity Tasks with Python

About this Course: In this course, you will be introduced to the Python programming language and apply it in a cybersecurity setting to automate tasks. You’ll start by focusing on foundational Python programming concepts, including data types, variables, conditional statements, and iterative statements. You’ll also learn to work with Python effectively by developing functions, using libraries and modules, and making your code readable. In addition, you’ll work with string and list data, and learn how to import, parse and debug files. Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.


Also visit:  Test your knowledge: Regular expressions Quiz Answer


 

Test your knowledge: Python and automation Quiz Answer

Question 1)
Which of the following potential signs of suspicious activity can you track with automated Python programs? Select all that apply.

  • Whether login attempts occurred outside of normal work hours
  • Whether login attempts occurred from IP addresses that are not established work zones
  • Whether phishing attempts occurred through in-person interactions
  • Whether several failed login attempts occurred within a short span of time

Question 2)
Which Python component contributes to automation by allowing you to perform the same actions a certain number of times based on a sequence?

  • Conditional statements
  • Bracket notation
  • while loops
  • for loops

Question 3)
Why is knowing how to work with files important for automation?

  • Cybersecurity-related information is often found in log files.
  • String and list methods are only accessible through files.
  • It is necessary to save a file in order to review what you have automated.
  • In order to create a function, it’s necessary to incorporate a file into it.

Question 4)
Which of the following are common file formats for security logs? Select all that apply.

  • .txt
  • .csv
  • .jpeg
  • .gif