Server and User Administration Quiz Answers | Cybersecurity Compliance Framework & System Administration Week 3 | IBM | Coursera
Greetings!! Today, we'll publish the complete week's worth of quiz answers from Coursera's Cybersecurity Compliance Framework & System Administration course. This blog will specifically answer Week 3 i.e. Server and User Administration course.
Cybersecurity Scope
Cybersecurity is a rapidly growing field with a wide range of job titles and positions. Here are some of the most common positions related to cybersecurity and their probable earnings:
- Information Security Analyst: Information security analysts are responsible for analyzing and monitoring an organization's computer networks and systems for potential security threats. The average salary for an information security analyst is around $80,000 to $100,000 per year.
- Cybersecurity Consultant: Cybersecurity consultants provide expert advice and guidance to organizations on how to protect their computer networks and systems from cyber threats. The average salary for a cybersecurity consultant is around $100,000 to $140,000 per year.
- Security Engineer: Security engineers are responsible for designing, implementing, and maintaining an organization's computer security systems and processes. The average salary for a security engineer is around $100,000 to $130,000 per year.
- Security Architect: Security architects are responsible for designing and implementing an organization's overall security strategy and ensuring that its computer networks and systems are properly secured. The average salary for a security architect is around $120,000 to $160,000 per year.
- Chief Information Security Officer (CISO): CISOs are responsible for developing and implementing an organization's overall information security strategy. They also oversee all aspects of an organization's cybersecurity program. The average salary for a CISO is around $200,000 to $300,000 per year.
- Ethical Hacker/Penetration Tester: Ethical hackers and penetration testers are responsible for identifying vulnerabilities in an organization's computer networks and systems and testing them for potential security threats. The average salary for an ethical hacker or penetration tester is around $100,000 to $140,000 per year.
It's important to note that these salaries are estimates and can vary based on factors such as industry, company size, location, and level of experience. Additionally, the demand for cybersecurity professionals is expected to continue to grow as cyber threats become more sophisticated, and as organizations increasingly rely on technology to conduct their business.
About the Course:
This course provides you with the foundational knowledge required to understand the key cybersecurity industry and compliance criteria. No matter what cybersecurity position you already have or wish to hold in an organization, it will be crucial for you to acquire this knowledge. You will become familiar with the fundamental user and server administration commands as they relate to security. You'll require this ability to understand operating system vulnerabilities in your organization. The ideas of endpoint security and patch management will be covered. To keep systems up to date and prevent cybersecurity incidents against a business, both these topics are crucial.
Finally, you will get in-depth knowledge of cryptography and encryption so that you can understand how these concepts impact software in an organization. This course is intended for anybody who wishes to get a fundamental grasp of Security Frameworks, Compliance, endpoint management, encryption, or cryptography.
What will you learn:
- List and discuss many important NIST, GDPR, HIPAA, SANS, and PCI compliance and industry standards.
- Give a brief description of the design, function, and roles of server and user administration.
- Understand the relationship between client system administration and the concepts of patching and endpoint security.
- Give definitions of cryptography terms such as encryption, encoding, hashing, and digital certificates.
Windows Administration ( PRACTICE QUIZ )
Q1)
Which three (3) objects are typically managed by the active directory?
- Services
- Network User
- Volumes
Q2)
Which type of group within Active Directory is used to assign permissions to
shared resources?
- Security groups
Q3)
Kerberos Authentication provides several benefits including which three (3) of
the following?
- interoperability
- single sign on
- delegated authentication
Q4)
Which of the nine different kinds of Windows events that can be audited is used
to see when someone has shutdown or restarted the computer or when a program
tries to do something it does not have permission to do?
- System events
Linux Basics ( PRACTICE QUIZ )
Q1)
True or False: Internal commands are built into the shell program and are shell
dependent?
- True
Q2)
Which Linux Run Level shuts down all services when the system is being rebooted?
- Run Level 6: Reboot
Server and User Administration ( Main QUIZ )
Q1)
Which Windows directory folder stores per-user application data and settings?
- AppData
Q2)
Which is NOT an example of a default Windows local user account?
- Network Service
Q3) Which feature allows Active Directory to
be shared by multiple servers ?
- A replication services
Q4) Which three (3) of the following steps can
be taken to help protect sensitive Windows domain accounts?
- Separate administrator accounts
from user accounts.
- Disable the account delegation
rights for administrator accounts.
- Create dedicated workstation
hosts without Internet and email access.
Q5) What tool can an administrator use to
manage servers on private networks that are not connected to the Internet?
- Windows Admin
Center
Q6) Which of the nine different kinds of
Windows events that can be audited is used to see each instance of a user
logging on to and logging off from another computer?
- Account logon
Q7) Which of these commands does not shutdown
the Linux operating system?
- reboot
- itit 6
- shutdown -r
Q8) Which Linux commands are totally
shell-independent and usually found in any Linux distribution?
- External commands
Q9) Which three (3) of the following are
common choices of Shell?
- tcsh
- Bash
- sh
Conclusion
With any luck, this post will help you quickly and easily uncover Week 3 assessment answers for Coursera's Cybersecurity Compliance Framework & System Administration Quiz. If this article has been helpful to you in any way, please let your friends and family know on social media about this wonderful training. Be patient with us as we release a tonne more free courses along with the exam/quiz solutions, and keep checking our QueHelp Blog for updates.
No comments:
Post a Comment