Table of Contents
All Weeks System Administration IT Infrastructure Services Coursera Quiz Answers
Week 1: What Is System Administration Quiz Answers
Quiz 01: What is System Administration?
Q1. Which of the following can be a responsibility of a systems administrator?
- Setting up new user accounts and machines
- Maintaining servers
- Troubleshooting user issues
- All of the above
Q2. Which of the following make up IT infrastructure?
- Hardware and software
- Network
- Operating systems
- All of the above
Q3. Which of these is considered a server? Check all that apply.
- A software that provides a service to other software
- Software that’s only available to the computer it’s installed on
- Software that provides a service to other machines
- A computer that provides a service to other computers
Q4. A KVM switch is used to:
- switch between multiple computers using one monitor, keyboard, and mouse
- mount multiple servers into one server rack.
- allow you to serve web content to many clients.
- enable you to receive incoming SSH connections.
Q5. Which of these server hardware can you stack on top of each other in a server rack?
- Blade
- Tower
- Desktop
- Rack
Q6. With _, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection.
- a PAN
- cloud computing
- a LAN
Q7. What are the benefits of cloud computing over local computing? Check all that apply.
- Services are accessible from anywhere in the world.
- There are smaller starting costs for cloud computing.
- There are potential long-term costs associated with cloud computing.
- Software updates are handled by the company providing the service.
Q8. What are the benefits of local computing over cloud computing? Check all that apply.
- Updates can be handled at anytime.
- There are potential long-term costs associated with local computing.
- Services are handled by another organization, so that makes your organization dependent on a third party.
- You have complete control of the IT infrastructure.
Quiz 02: Systems Administration Tasks
Q1. Which of the following is a good policy to enforce on passwords? Check all that apply.
- A long password length
- The use of common words
- A mixture of symbols and numbers
- A short password length
Q2. Which of these is part of the hardware lifecycle? Check all that apply.
- Retirement
- Procurement
- Deployment
Peer Graded Assessment:
Week 2: Network & Infrastructure Services Quiz Answers
Quiz 01: Intro to IT Infrastructure Services
Q1. Which of the following is considered a physical infrastructure service? Check all that apply.
- Laptop
- Desktop
- Rack server
- Operating systems
Q2. Which of these is considered a network service? Check all that apply.
- Wireless Internet
- DNS
- Blade server
- Ethernet cables
Q3. Which of these is considered a software service? Check all that apply.
- Chat applications
- Word processors
- Email applications
- Wireless Internet
Quiz 02: Physical Infrastructure Services
Q1. If you’re running a server, which one of the follow operating systems would be best suited for your server?
- Windows 10
- Ubuntu Server
- MacOS
- Ubuntu
Q2. What are the benefits of virtualizing servers? Check all that apply.
- Better hardware resource utilization
- Easier maintenance
- Lower costs
- Better performance than a dedicated server
Q3. Which of the following do you need in order to SSH to a machine? Check all that apply.
- An SSH client on the machine you want to connect from
- A VPN connection
- An SSH server on the machine you want to connect to
- A virtual server to connect to
Peer Graded System
Week 3: Software & Platform Services Quiz Answers
Quiz 01: Software Services
Q1. What are some communication services you can utilize in your organization? Check all that apply.
- Chat applications
- DNS
- Phones
Q2. What’s the difference between POP3 and IMAP? Check all that apply.
- POP3 can only download email to one local device.
- IMAP can only download email to one local device.
- POP3 is used for sending emails.
- IMAP can download emails onto multiple devices.
Q3. True or false: Commercial-use and personal-use software licenses are essentially the same thing.
- True
- False
Q4. What are the differences between TLS and SSL? Check all that apply.
- TLS is the successor to SSL.
- TLS is more secure than SSL.
- SSL is more secure than TLS.
- SSL is the successor to TLS.
Quiz 02: File, Print, and Platform Services
Q1. What are the benefits of setting up an NFS server? Check all that apply.
- Connecting to printers
- Storing files on a network drive
- Enabling files to be shared over a network
- Serving web content
Q2. What methods could you use to set up printing in an organization? Check all that apply.
- Directly connecting a printer
- Setting up a print server
- Using a cloud service to set up printers
- Setting up an NFS server
Q3. When you have a web server, what service is used to enable HTTP requests to be processed?
- An HTTP server
- The web server
- HTTP status codes
- A database server
Q4. You can use a(n) ______________to store large amounts of customer data for a website.
- NFS server
- HTTP server
- database server
- DNS server
Quiz 03: Troubleshooting Platform Services
Q1. HTTP status codes that begin with 4xx, like 404, indicate errors on:
- The client-side
- The server-side
- Nowhere; these codes are successful
- Redirections
Q2. HTTP status codes that begin with 5xx, like 501, indicate errors on:
- The client-side
- The server-side
- Nowhere; these codes are successful
- Redirections
Peer Graded Assessment
Week 4: Directory Services Quiz Answers
Quiz 01: Active Directory
Q1. What is Active Directory? Check all that apply.
- An open-source directory server
- A Windows-only implementation of a directory server
- Microsoft’s implementation of a directory server
- An LDAP-compatible directory server
Q2. How is an Organizational Unit different from a normal container?
- It’s not; it’s just a different name for a container x
- It can hold other objects
- It can only hold other containers
- It can hold additional containers
Q3. When you create an Active Directory domain, what’s the name of the default user account?
- Superuser
- Root
- Username
- Administrator
Q4. True or false: Machines in the Domain Controllers group are also members of the Domain Computers group.
- True
- False
Q5. In what way are security groups different from distribution groups?
- They’re the exact same thing.
- Security groups are used for computers, while distribution groups are used for users.
- Security groups are used for users, while distribution groups are used for computers.
- Security groups can be used to provide access to resources, while distribution groups are only used for email communication.
Q6. What’s the difference between changing a password and resetting a password?
- Changing a password requires the previous password.
- Changing a password does not require the previous password.
- Resetting a password locks the account.
- They’re the same.
Q7. True or false: Joining a computer to Active Directory involves joining the computer to a workgroup.
- True
- False
Q8. Joining a computer to an AD domain provides which of the following advantages? Check all that apply.
- Centralized authentication
- More detailed logging
- Centralized management with GPOs
- Better performance
Q9. What are Group Policy Objects?
- Special types of containers
- Special types of computers groups
- Special types of user groups
- Settings for computers and user accounts in AD
Q10. What’s the difference between a policy and a preference?
- They’re the exact same thing.
- A policy is used to set a preference.
- A policy is enforced by AD, while a preference can be modified by a local user.
- A policy can be modified by a local user, while a preference is enforced by AD.
Q11. With a brand new AD domain, what do you need to change before you can target groups of users and machines with GPOs?
- Nothing; the default configuration is good to go.
- You need to place users and computers into new OUs.
- You need to create an administrator account.
- You need to rename the default groups.
Q12. Select the right order of enforcement of GPOs:
- Site –> Domain –> OU
- OU –> Domain –> Site
- Domain –> Site –> OU
- Site –> OU –> Domain
Q13. What can we use to determine what policies will be applied for a given machine?
- gpupdate [INCORRECT]
- A control panel [INCORRECT]
- A test domain
- An RSOP report
Q14. How does a client discover the address of a domain controller?
- It’s pushed via an AD GPO.
- It sends a broadcast to the local network.
- It makes a DNS query, asking for the SRV record for the domain.
- It’s provided via DHCP.
Q15. Which of the following could prevent you from logging into a domain-joined computer? Check all that apply.
- You’re unable to reach the domain controller.
- Your computer is connected to Wifi.
- The user account is locked.
- The are time and date are incorrect.
Quiz 02: Centralized Management and LDAP
Q1. Which of these are examples of centralized management? Check all that apply.
- Role-based access control
- Centralized configuration management
- Copying configurations to various systems
- Local authentication
Q2. Which of these are components of an LDAP entry? Check all that apply.
- Uncommon Name
- Common Name
- Organizational User
- Distinguished Name
Q3. What’s does the LDAP Bind operation do exactly?
- Modifies entries in a directory server
- Looks up information in a directory server
- Authenticates a client to the directory server
- Changes the password for a user account on the directory server
Q4. Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.
- Anonymous
- Simple
- Complex
- SASL
Quiz 03: Introduction to Directory Services
Q1. What does a directory server provide?
- A real-time communication service
- A network time service
- A lookup service for an organization
- A replication service
Q2. What benefits does replication provide? Check all that apply.
- Redundancy
- Enhanced security
- Increased capacity
- Decreased latency
Q3. What’s the most popular directory services protocol used today?
- Directory Access Protocol
- Directory System Protocol
- Lightweight Directory Access Protocol
- Directory Operational Binding Management Protocol
Peer Graded Assessment
Week 5: Data Recovery & Backups Quiz Answers
Quiz 01: Disaster Recovery Plans
Q1. What elements should a disaster recovery plan cover? Check all that apply.
- Detection measures
- Preventative measures
- Recovery measures
- Drastic measures
Q2. Why are detection measures included in a disaster recovery plan?
- They aren’t
- Because it’s important to know when a disaster occurs
- Because they prevent data loss
- Because they make recovering from data loss easier
Q3. What are good preventative measures to incorporate in your organization? Check all that apply.
- Monitoring and alerting systems
- Redundant systems
- Regular backups
- Accessible and up-to-date documentation
Q4. What are good detection measures to incorporate in your organization? Check all that apply.
- Environmental monitoring
- Backing up firewall rules
- Redundant power supplies
- System performance monitoring
Q5. What are good recovery measures to incorporate in your organization? Check all that apply.
- Restoring server configs from backup
- Following detailed recovery plan documentation
- Monitoring for internet line outages
- Maintaining redundant servers
Quiz 02: Planning for Data Recovery
Q1. How can you recover from an unexpected data loss event? Check all that apply.
- Write a post-mortem report.
- Recover data from damaged devices.
- Restore data from backups.
- Design a disaster recovery plan.
Q2. Where is it best to store backups, physically?
- On-site
- Off-site
- In a safe
- Across multiple locations
Q3. Which of these should be included in your backups? Check all that apply.
- Firewall configurations
- A downloads folder
- Family vacation photos
- Sales databases
Q4. What’s magnetic tape backup media best suited for?
- Long-term archival data
- Low-latency cached data
- Cheap backup systems
- Quick and efficient backups
Q5. Why is it important to test backups and restoration procedures? Check all that apply.
- To reduce the size of backup data
- To speed up the backup-and-restore process
- To ensure backups work and data can be restored from them
- To ensure that relevant data is included in the backups
Q6. Which of the following backup types are most space-efficient?
- Full backups
- Differential backups
- Incremental backups
Q7. True or false: You can use a RAID array and use rsync to copy critical data to it for backups.
- True
- False
Quiz 03: Post-Mortems
Q1. What’s the intent behind writing a post-mortem?
- To assign blame for mistakes
- To assign legal liability
- To learn from mistakes and improve in the future
- To scare people into avoiding risky behavior
Q2. What should the timeline in a post-mortem include? Check all that apply.
- Actions taken before, during, and after the event
- A detailed analysis of the incident, including root cause and scope
- Detailed dates and times
- A summary of the incident and how long it lasted
Peer Graded Assessment
Week 6: Final Project
Next Course Quiz Answers >>
IT Security: Defense against the digital dark arts
<< Previous Course Quiz Answers
Operating Systems and You: Becoming a Power User
There are 5 Courses in Google IT Support Professional Certificate
Course 1: Technical Support Fundamentals
Course 2: The Bits and Bytes of Computer Networking
Course 3: Operating Systems and You: Becoming a Power User
Course 4: System Administration and IT Infrastructure Services
Course 5: IT Security: Defense against the digital dark arts