Module 06 Challenge: Operating System in Practice Quiz Answers

Get The Bits and Bytes of Computer Networking Coursera Quiz Answers

Q1. What is the first step in connecting to a remote computer using SSH?

Answer: Type in the host name or IP address of the computer you want to connect to.

Explanation: The first step in establishing an SSH connection is specifying the host name or IP address of the remote computer you want to access. After that, you can initiate the connection and enter your credentials.


Q2. What is the Microsoft Terminal Services Client used for?

Answer: Creating RDP connections to remote computers.

Explanation: The Microsoft Terminal Services Client (now known as Remote Desktop Connection) is used to create Remote Desktop Protocol (RDP) connections, allowing users to connect to remote Windows computers.


Q3. What is one reason you might avoid sharing a folder with everyone on your network in Windows?

Answer: It’s not very secure.

Explanation: Sharing a folder with “everyone” on the network exposes it to unauthorized access, making it a security risk. It’s important to carefully control permissions to avoid vulnerabilities.


Q4. What is Virtual Box?

Answer: A virtual machine.

Explanation: VirtualBox is a virtualization software that allows you to run virtual machines on a physical host, enabling you to run different operating systems on the same physical machine.


Q5. Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?

Answer: Yes.

Explanation: It is possible to run a Linux virtual instance on a Windows host using virtualization software like VirtualBox, VMware, or Hyper-V.


Q6. What Windows application stores events logged by the operating system?

Answer: Event Viewer.

Explanation: Event Viewer is the Windows application that logs system events, including error, warning, and informational messages, providing a centralized view for system troubleshooting.


Q7. It is important that logs are regularly cleaned out to make room for new ones. In Linux, what utility manages this?

Answer: logrotate.

Explanation: logrotate is the Linux utility that automates the rotation and compression of log files, ensuring that logs do not consume too much disk space.


Q8. Which of the following commands can be used to observe your syslog in real time?

Answer: tail -f /var/log/syslog.

Explanation: The tail -f command is used to monitor log files in real-time. When applied to /var/log/syslog, it will display new log entries as they are written.


Q9. What is disk cloning used for? Select two that apply.

Answer:

  • To image a computer system.
  • To back up a machine.
    Explanation:
    Disk cloning is used to create an exact copy (image) of a system’s hard drive, often for backup purposes or for deploying a system to multiple machines.

Q10. What is the difference between using SCP and other methods of file transfer?

Answer: SCP uses SSH to transfer data.

Explanation: SCP (Secure Copy Protocol) uses SSH (Secure Shell) for encrypted data transfer between hosts, providing a secure way to transfer files over the network compared to other methods like FTP, which may not have built-in encryption.

Get Complete The Bits and Bytes of Computer Networking Coursera Quiz Answers

Module 01 Challenge: Working with Files in Windows and Linux Quiz Answers

Module 02 Challenge: Users, Administrators, Groups and Permissions Quiz Answers

Module 03 Challenge: Package and Software Management Quiz Answers

Module 04 Challenge: Filesystems Graded Quiz Answers

Module 05 Challenge: Process Management Quiz Answers

Module 06 Challenge: Operating System in Practice Quiz Answers

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *