System Administration IT Infrastructure Services Quiz Answers

All Weeks System Administration IT Infrastructure Services Coursera Quiz Answers

Week 1: What Is System Administration Quiz Answers

Quiz 01: What is System Administration?

Q1. Which of the following can be a responsibility of a systems administrator?

  • Setting up new user accounts and machines
  • Maintaining servers
  • Troubleshooting user issues
  • All of the above

Q2. Which of the following make up IT infrastructure?

  • Hardware and software
  • Network
  • Operating systems
  • All of the above

Q3. Which of these is considered a server? Check all that apply.

  • A software that provides a service to other software
  • Software that’s only available to the computer it’s installed on
  • Software that provides a service to other machines
  • A computer that provides a service to other computers

Q4. A KVM switch is used to:

  • switch between multiple computers using one monitor, keyboard, and mouse
  • mount multiple servers into one server rack.
  • allow you to serve web content to many clients.
  • enable you to receive incoming SSH connections.

Q5. Which of these server hardware can you stack on top of each other in a server rack?

  • Blade
  • Tower
  • Desktop
  • Rack

Q6. With _, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection.

  • a PAN
  • cloud computing
  • a LAN

Q7. What are the benefits of cloud computing over local computing? Check all that apply.

  • Services are accessible from anywhere in the world.
  • There are smaller starting costs for cloud computing.
  • There are potential long-term costs associated with cloud computing.
  • Software updates are handled by the company providing the service.

Q8. What are the benefits of local computing over cloud computing? Check all that apply.

  • Updates can be handled at anytime.
  • There are potential long-term costs associated with local computing.
  • Services are handled by another organization, so that makes your organization dependent on a third party.
  • You have complete control of the IT infrastructure.

Quiz 02: Systems Administration Tasks

Q1. Which of the following is a good policy to enforce on passwords? Check all that apply.

  • A long password length
  • The use of common words
  • A mixture of symbols and numbers
  • A short password length

Q2. Which of these is part of the hardware lifecycle? Check all that apply.

  • Retirement
  • Procurement
  • Deployment

Peer Graded Assessment:

Click here to Download

Week 2: Network & Infrastructure Services Quiz Answers

Quiz 01: Intro to IT Infrastructure Services

Q1. Which of the following is considered a physical infrastructure service? Check all that apply.

  • Laptop
  • Desktop
  • Rack server
  • Operating systems

Q2. Which of these is considered a network service? Check all that apply.

  • Wireless Internet
  • DNS
  • Blade server
  • Ethernet cables

Q3. Which of these is considered a software service? Check all that apply.

  • Chat applications
  • Word processors
  • Email applications
  • Wireless Internet

Quiz 02: Physical Infrastructure Services

Q1. If you’re running a server, which one of the follow operating systems would be best suited for your server?

  • Windows 10
  • Ubuntu Server
  • MacOS
  • Ubuntu

Q2. What are the benefits of virtualizing servers? Check all that apply.

  • Better hardware resource utilization
  • Easier maintenance
  • Lower costs
  • Better performance than a dedicated server

Q3. Which of the following do you need in order to SSH to a machine? Check all that apply.

  • An SSH client on the machine you want to connect from
  • A VPN connection
  • An SSH server on the machine you want to connect to
  • A virtual server to connect to

Peer Graded System

Click here to Download

Week 3: Software & Platform Services Quiz Answers

Quiz 01: Software Services

Q1. What are some communication services you can utilize in your organization? Check all that apply.

  • Email
  • Chat applications
  • DNS
  • Phones

Q2. What’s the difference between POP3 and IMAP? Check all that apply.

  • POP3 can only download email to one local device.
  • IMAP can only download email to one local device.
  • POP3 is used for sending emails.
  • IMAP can download emails onto multiple devices.

Q3. True or false: Commercial-use and personal-use software licenses are essentially the same thing.

  • True
  • False

Q4. What are the differences between TLS and SSL? Check all that apply.

  • TLS is the successor to SSL.
  • TLS is more secure than SSL.
  • SSL is more secure than TLS.
  • SSL is the successor to TLS.

Quiz 02: File, Print, and Platform Services

Q1. What are the benefits of setting up an NFS server? Check all that apply.

  • Connecting to printers
  • Storing files on a network drive
  • Enabling files to be shared over a network
  • Serving web content

Q2. What methods could you use to set up printing in an organization? Check all that apply.

  • Directly connecting a printer
  • Setting up a print server
  • Using a cloud service to set up printers
  • Setting up an NFS server

Q3. When you have a web server, what service is used to enable HTTP requests to be processed?

  • An HTTP server
  • The web server
  • HTTP status codes
  • A database server

Q4. You can use a(n) ______________to store large amounts of customer data for a website.

  • NFS server
  • HTTP server
  • database server
  • DNS server

Quiz 03: Troubleshooting Platform Services

Q1. HTTP status codes that begin with 4xx, like 404, indicate errors on:

  • The client-side
  • The server-side
  • Nowhere; these codes are successful
  • Redirections

Q2. HTTP status codes that begin with 5xx, like 501, indicate errors on:

  • The client-side
  • The server-side
  • Nowhere; these codes are successful
  • Redirections

Peer Graded Assessment

Click here to Download

Week 4: Directory Services Quiz Answers

Quiz 01: Active Directory

Q1. What is Active Directory? Check all that apply.

  • An open-source directory server
  • A Windows-only implementation of a directory server
  • Microsoft’s implementation of a directory server
  • An LDAP-compatible directory server

Q2. How is an Organizational Unit different from a normal container?

  • It’s not; it’s just a different name for a container x
  • It can hold other objects
  • It can only hold other containers
  • It can hold additional containers

Q3. When you create an Active Directory domain, what’s the name of the default user account?

  • Superuser
  • Root
  • Username
  • Administrator

Q4. True or false: Machines in the Domain Controllers group are also members of the Domain Computers group.

  • True
  • False

Q5. In what way are security groups different from distribution groups?

  • They’re the exact same thing.
  • Security groups are used for computers, while distribution groups are used for users.
  • Security groups are used for users, while distribution groups are used for computers.
  • Security groups can be used to provide access to resources, while distribution groups are only used for email communication.

Q6. What’s the difference between changing a password and resetting a password?

  • Changing a password requires the previous password.
  • Changing a password does not require the previous password.
  • Resetting a password locks the account.
  • They’re the same.

Q7. True or false: Joining a computer to Active Directory involves joining the computer to a workgroup.

  • True
  • False

Q8. Joining a computer to an AD domain provides which of the following advantages? Check all that apply.

  • Centralized authentication
  • More detailed logging
  • Centralized management with GPOs
  • Better performance

Q9. What are Group Policy Objects?

  • Special types of containers
  • Special types of computers groups
  • Special types of user groups
  • Settings for computers and user accounts in AD

Q10. What’s the difference between a policy and a preference?

  • They’re the exact same thing.
  • A policy is used to set a preference.
  • A policy is enforced by AD, while a preference can be modified by a local user.
  • A policy can be modified by a local user, while a preference is enforced by AD.

Q11. With a brand new AD domain, what do you need to change before you can target groups of users and machines with GPOs?

  • Nothing; the default configuration is good to go.
  • You need to place users and computers into new OUs.
  • You need to create an administrator account.
  • You need to rename the default groups.

Q12. Select the right order of enforcement of GPOs:

  • Site –> Domain –> OU
  • OU –> Domain –> Site
  • Domain –> Site –> OU
  • Site –> OU –> Domain

Q13. What can we use to determine what policies will be applied for a given machine?

  • gpupdate [INCORRECT]
  • A control panel [INCORRECT]
  • A test domain
  • An RSOP report

Q14. How does a client discover the address of a domain controller?

  • It’s pushed via an AD GPO.
  • It sends a broadcast to the local network.
  • It makes a DNS query, asking for the SRV record for the domain.
  • It’s provided via DHCP.

Q15. Which of the following could prevent you from logging into a domain-joined computer? Check all that apply.

  • You’re unable to reach the domain controller.
  • Your computer is connected to Wifi.
  • The user account is locked.
  • The are time and date are incorrect.

Quiz 02: Centralized Management and LDAP

Q1. Which of these are examples of centralized management? Check all that apply.

  • Role-based access control
  • Centralized configuration management
  • Copying configurations to various systems
  • Local authentication

Q2. Which of these are components of an LDAP entry? Check all that apply.

  • Uncommon Name
  • Common Name
  • Organizational User
  • Distinguished Name

Q3. What’s does the LDAP Bind operation do exactly?

  • Modifies entries in a directory server
  • Looks up information in a directory server
  • Authenticates a client to the directory server
  • Changes the password for a user account on the directory server

Q4. Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

  • Anonymous
  • Simple
  • Complex
  • SASL

Quiz 03: Introduction to Directory Services

Q1. What does a directory server provide?

  • A real-time communication service
  • A network time service
  • A lookup service for an organization
  • A replication service

Q2. What benefits does replication provide? Check all that apply.

  • Redundancy
  • Enhanced security
  • Increased capacity
  • Decreased latency

Q3. What’s the most popular directory services protocol used today?

  • Directory Access Protocol
  • Directory System Protocol
  • Lightweight Directory Access Protocol
  • Directory Operational Binding Management Protocol

Peer Graded Assessment

Click here to Download

Week 5: Data Recovery & Backups Quiz Answers

Quiz 01: Disaster Recovery Plans

Q1. What elements should a disaster recovery plan cover? Check all that apply.

  • Detection measures
  • Preventative measures
  • Recovery measures
  • Drastic measures

Q2. Why are detection measures included in a disaster recovery plan?

  • They aren’t
  • Because it’s important to know when a disaster occurs
  • Because they prevent data loss
  • Because they make recovering from data loss easier

Q3. What are good preventative measures to incorporate in your organization? Check all that apply.

  • Monitoring and alerting systems
  • Redundant systems
  • Regular backups
  • Accessible and up-to-date documentation

Q4. What are good detection measures to incorporate in your organization? Check all that apply.

  • Environmental monitoring
  • Backing up firewall rules
  • Redundant power supplies
  • System performance monitoring

Q5. What are good recovery measures to incorporate in your organization? Check all that apply.

  • Restoring server configs from backup
  • Following detailed recovery plan documentation
  • Monitoring for internet line outages
  • Maintaining redundant servers

Quiz 02: Planning for Data Recovery

Q1. How can you recover from an unexpected data loss event? Check all that apply.

  • Write a post-mortem report.
  • Recover data from damaged devices.
  • Restore data from backups.
  • Design a disaster recovery plan.

Q2. Where is it best to store backups, physically?

  • On-site
  • Off-site
  • In a safe
  • Across multiple locations

Q3. Which of these should be included in your backups? Check all that apply.

  • Firewall configurations
  • A downloads folder
  • Family vacation photos
  • Sales databases

Q4. What’s magnetic tape backup media best suited for?

  • Long-term archival data
  • Low-latency cached data
  • Cheap backup systems
  • Quick and efficient backups

Q5. Why is it important to test backups and restoration procedures? Check all that apply.

  • To reduce the size of backup data
  • To speed up the backup-and-restore process
  • To ensure backups work and data can be restored from them
  • To ensure that relevant data is included in the backups

Q6. Which of the following backup types are most space-efficient?

  • Full backups
  • Differential backups
  • Incremental backups

Q7. True or false: You can use a RAID array and use rsync to copy critical data to it for backups.

  • True
  • False

Quiz 03: Post-Mortems

Q1. What’s the intent behind writing a post-mortem?

  • To assign blame for mistakes
  • To assign legal liability
  • To learn from mistakes and improve in the future
  • To scare people into avoiding risky behavior

Q2. What should the timeline in a post-mortem include? Check all that apply.

  • Actions taken before, during, and after the event
  • A detailed analysis of the incident, including root cause and scope
  • Detailed dates and times
  • A summary of the incident and how long it lasted

Peer Graded Assessment

Click here to Download

Week 6: Final Project

Click here to Download

Next Course Quiz Answers >>

IT Security: Defense against the digital dark arts

<< Previous Course Quiz Answers

Operating Systems and You: Becoming a Power User

There are 5 Courses in Google IT Support Professional Certificate

Course 1: Technical Support Fundamentals

Course 2: The Bits and Bytes of Computer Networking

Course 3: Operating Systems and You: Becoming a Power User

Course 4: System Administration and IT Infrastructure Services

Course 5: IT Security: Defense against the digital dark arts

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!