Hello colleagues, today we are going to shareWeekly assessment and quiz answersvonServices for system administration IT infrastructure,Google-IT-SupportprofessionalCourse started byCourseratotally free ✅✅✅. This is a certified course for any interested student.
If you didn't find this free course, you canRequest financial releasesto get this course completely free.
check this article–"How do I request financial notices?"
About this course-
This course takes you working on a single computer for an entire fleet. Systems administration is the area of IT concerned with maintaining reliable computing systems in a multi-user environment. In this course, you will learn about the infrastructure services that keep organizations large and small running. We delve into the cloud to help you understand everything from typical cloud infrastructure configurations to managing cloud resources. You will also learn how to administer and configure servers and how to use industry tools to manage computers, user information and user productivity. Finally, you will learn how to restore your company's IT infrastructure in the event of a disaster.
At the end of this course, you will be able to:
- Use best practices to choose hardware, vendors, and services for your business
- Understand how the most common infrastructure services support an organization
running work and how infrastructure servers are managed - Learn how to get the most out of the cloud for your business
- Manage computers and users in an organization using directory services, Active
Directory and OpenLDAP - Choose and manage the tools your organization will use
- Back up your company data and learn how to restore your IT infrastructure in an emergency
a disaster - Use systems administration skills to plan and improve processes in IT environments
here you will findServices for system administration IT infrastructureexam answersEmbold colorwhich are given below.
Use "Ctrl + F" to find the answers to the questions. And for mobile users, all you have to do is click on the three dots in your browser and you'll get a "Search" option there. Use these options to get answers to random questions.
apply link -
Services for system administration IT infrastructure
System Administration IT Infrastructure Services Answers to Coursera Quizzes and Assessments
System administration tasks
question 1
Which of the following is a good password enforcement policy? Please tick the relevant box.
- A long password length
- The use of common words.
- A mixture of symbols and numbers.
- A short password length
Passwords are one of the first and most important security policies that help prevent unauthorized access. A good guideline for passwords is to make them long and use a mix of symbols, numbers, and uppercase and lowercase letters.
question 2
Which of these is part of the hardware lifecycle? Please tick the relevant box.
- retirement
- To receive
- Mission
- network connectivity
The hardware lifecycle consists of four main phases: acquisition, deployment, maintenance, and retirement.
What is system administration?
question 1
Which of the following tasks can a system administrator be responsible for?
- Configure new user and machine accounts
- server maintenance
- User Troubleshooting
- all previous
A system administrator has a wide range of responsibilities; this may include setting up new user and machine accounts; server maintenance; and resolving user issues.
question 2
Which of the following constitutes an IT infrastructure?
- hardware e software
- Rot
- operational systems
- all previous
IT infrastructure includes software, hardware, networking, operating systems and other services that an organization needs to operate in an enterprise IT environment.
question 3
Which of these counts as a server? Please tick the relevant box.
- Software that provides a service to other software.
- Software available only for the computer on which it is installed
- Software that provides a service to other machines.
- A computer that provides a service to other computers
Servers are essentially software or computers that provide a service to other software or computers.
question 4
A KVM switch is used for:
- Switch between multiple computers with one monitor, keyboard and mouse
- Mount multiple servers in a server rack.
- allow you to serve web content to many clients.
- allow you to receive incoming SSH connections.
A KVM switch is a device used to switch between multiple keyboard and video display computers such as a B. A monitor and mouse are used. Hence the name "KVM"!
question 5
Which of these server hardware can you stack on top of each other in a server rack?
- blade
- torre
- Mesa
- To be
A server rack and blade lie flat and can be stacked on top of each other when you mount them in a server rack.
question 6
Swindler_you can access your data, use apps and more from anywhere in the world as long as you have an internet connection.
- to the BREAD
- Cloud computing
- uma LAN
The cloud is a network of servers that store and process our data. We refer to the concept of cloud computing as a way of doing our daily work on the computer from anywhere as long as we have an internet connection.
question 7
What advantages does cloud computing have over local computing? Please tick the relevant box.
- The Services are accessible from anywhere in the world.
- There are lower upfront costs for cloud computing.
- There are potential long-term costs associated with cloud computing.
- Software updates are performed by the service provider.
Cloud computing has great advantages, such as lower upfront costs, services that can be accessed from anywhere in the world with an Internet connection, and software updates performed by another company.
question 8
What are the advantages of local computing over cloud computing? Please tick the relevant box.
- Updates can be managed at any time.
- There are potential long-term costs associated with local computing.
- The Services are being provided by another organization, making your organization dependent on the third party.
- You have full control over your IT infrastructure.
With local computing, you have complete control over your IT infrastructure and can update and protect your business at any time.
peer review
https://drive.google.com/drive/folders/1SrmZ1QAx7JBn4UqdmTeipD2R6YRvr6xW?usp=sharing
2. Network and Infrastructure Services
Introduction to IT infrastructure services
question 1
Which of the following services is considered a physical infrastructure service? Please tick the relevant box.
- Portable computer
- Mesa
- Rack-Server
- operational systems
Physical infrastructure services consist of the physical hardware that an organization uses in its IT environment.
question 2
Which of these is considered a network service? Please tick the relevant box.
- wireless internet connection
- DNS
- blade server
- cabo ethernet
Network services consist of network components that an organization uses in its IT environment such as B. Network protocols, network hardware, etc.
question 3
Which of these counts as a software service? Please tick the relevant box.
- chat apps
- word processors
- email apps
- wireless internet connection
Software services consist of the software that an organization uses in its IT environment.
physical infrastructure services
question 1
If you are running a server, which of the following operating systems would be best for your server?
- window 10
- no server
- MacOS
- ubuntu
If you're running a server, it's best to use a server operating system that has been specially optimized for server performance.
question 2
What are the advantages of server virtualization? Please tick the relevant box.
- Better utilization of hardware resources
- easier maintenance
- lower costs
- Better performance than a dedicated server
Server virtualization offers many benefits, including hardware that is easier to use, easier to maintain, and generally lower in cost.
question 3
Which of the following do you need to SSH to a machine? Please tick the relevant box.
- An SSH client on the computer you want to connect from
- A VPN connection
- An SSH server on the computer you want to connect to
- A virtual server to connect
To use SSH from one computer to another, you need to have an SSH client on the computer you want to connect from, along with an SSH server on the computer you want to connect to.
sudo service rsyslog status # Check service status
logger This is a test log entry # Send the text to the rsyslog service and the service will write it to /var/log/syslog
sudo tail -1 /var/log/syslog # View last lines in /var/log/syslog
sudo service rsyslog stop # stop the rsyslog service
sudo service rsyslog status # Show current service status
sudo tail -5 /var/log/syslog # see what command was logged in /var/log/syslog
logger This is another test log entry. # Try sending text again using our logger command
sudo tail /var/log/syslog # Check the contents of /var/log/syslog
sudo service rsyslog start # start the rsyslog service
sudo service rsyslog status # Check status
sudo systemctl –state=failed # List of services that are in a failed state
sudo service cups status # Get more information about service cups
sudo ls -l /etc/cups # Display the contents of the /etc/cups directory
sudo mv /etc/cups/cupsd.conf.old /etc/cups/cupsd.conf # move file
sudo ls -l /etc/cups # Display the contents of the /etc/cups directory
service cups sudo start # cups start
sudo service cups status # Check the status
sudo service ntp status # View the service that manages the machine's exact date and time: NTP.
sudo date -s '2017-01-01 00:00:00' # manually alter to date
Date # Check the date
sudo tail /var/log/syslog # View last lines in syslog
sudo service ntp restart # restart ntp, service notices time change and corrects to current time
Date # Check the date
sudo ls -l /var/log/cups # displays the contents of the /var/log/cups directory
sudo nano /etc/cups/cupsd.conf # edit /etc/cups/cupsd.conf with nano, replace warning with debug
sudo reload service cups # reload cups
sudo cat /var/log/cups/error_log # see that now there is a lot of content in /var/log/cups/error_log
sudo reload service cups # reload cups
peer-reviewed system
https://drive.google.com/drive/folders/113B7h6f0fmFY-1t-mn-TSai8CQCH0466?usp=sharing
3. Platform services and software
File, print and platform services
question 1
What are the advantages of setting up an NFS server? Please tick the relevant box.
- Connection with printers
- Saving files to a network drive
- Allow file sharing on a network
- Web content delivery
A network file storage or NFS server is used to store files on a network and allow them to be shared with others.
question 2
What methods could you use to set up printing in an organization? Please tick the relevant box.
- Direct connection of a printer
- Configure print server
- Using a Cloud Service to Configure Printers
- Configure an NFS server
From small to large organizations, you have many options for configuring a printer.
question 3
If you have a web server, what service is used to allow HTTP requests to be processed?
- ein HTTP-Server
- the web server
- HTTP status codes
- A database server
HTTP servers like the Apache web server are used to process HTTP requests.
question 4
You can use a ______________ to store large amounts of customer data for a website.
- Servidor-NFS
- Servidor-HTTP
- database server
- Servidor-DNS
Databases like MySQL and PostgreSQL are commonly used to store data.
software services
question 1
What communication services can you use in your organization? Please tick the relevant box.
- chat apps
- DNS
- the phones
Communication services such as chat applications, email, and phone calls allow you to communicate with others in an organization.
question 2
What is the difference between POP3 and IMAP? Please tick the relevant box.
- POP3 can only download email to a local device.
- IMAP can only download email to a local device.
- POP3 is used to send emails.
- IMAP can download email to multiple devices.
POP3 just lets you download email to a device that you can use if you want more privacy with your email. IMAP allows you to download emails on multiple devices, which is the most used email protocol today.
question 3
True or False: Software licenses for commercial use and personal use are basically the same thing.
- TRUE
- INCORRECT
Most software vendors have separate agreements for businesses. Before purchasing or installing any software, you must read the software license agreement.
question 4
What are the differences between TLS and SSL? Please tick the relevant box.
- TLS is the successor to SSL.
- TLS is more secure than SSL.
- SSL is more secure than TLS.
- SSL is the successor to TLS.
Although TLS and SSL are used interchangeably, they do have differences. For example, newer versions of TLS are more secure than SSL.
Troubleshooting platform services
question 1
HTTP status codes starting with 4xx, such as B. 404, indicate errors in:
- client side
- the server side
- Nowhere; These codes are successful
- redirect
HTTP 4xx status codes indicate a problem with the client, for example, entering the wrong URL or accessing something you don't have permissions for.
question 2
HTTP status codes starting with 5xx, such as 501, indicate errors in:
- client side
- the server side
- Nowhere; These codes are successful
- redirect
HTTP 5xx status codes indicate a problem with the server serving the web content.
# The ServerName directive specifies the request scheme, hostname, and port
# used by the server to identify itself. This is used when creating
# Redirect URL. In the context of virtual hosts, ServerName
# specifies which hostname should appear in the Host: request header for
# matches this virtual host. For the default virtual host (this file) this
The # value is not critical as it is used as the last instance host regardless.
# However, you must explicitly configure it for any additional virtual hosts.
#Servername www.example.com
ServerAdmin webmaster@localhostDocumentRoot /var/www/ourcompany<directory /var/www/ourcompany> Options + Include XBitHack in</directory> # Available logging levels: trace8, ..., trace1, debug, info, warning, warning, # error , crit , alert, emerg.# It is also possible to set the log level for # specific modules, for example for example #LogLevel info ssl:warnErrorLog ${APACHE_LOG_DIR}/error.logCustomLog ${APACHE_LOG_DIR}/access.log combined# For most conf-available/ configuration files that are # enabled or disabled globally, it is possible to # add a Line just for a specific virtual host. For example, the following line # enables CGI configuration for this host only after # it has been globally disabled with "a2disconf". #include conf-available/serve-cgi-bin.conf
vim: sintaxis = apache ts = 4 sw = 4 pts = 4 sr noet
peer review
https://drive.google.com/drive/folders/1o201-K2MZW_SQuxamceIvrmjNBITgUNK?usp=sharing
4. Directory services
Active Directory
question 1
What is Active Directory? Please tick the relevant box.
- An open source directory server
- A Windows-only implementation of a directory server
- Microsoft's Implementation of a Directory Server
- An LDAP-compliant directory server
Active Directory is the Microsoft Windows-specific implementation of a directory server. It is fully LDAP compliant, so it will work with any LDAP-compliant client, although it has some features that are unique to the Windows ecosystem.
question 2
How is an OU different from a regular container?
- It is not; it's just another name for an x container
- It may contain other objects.
- It can only contain other containers.
- May contain additional containers.
An OU is a special type of container that can contain other containers.
question 3
What is the default user account name when creating an Active Directory domain?
- excessive use
- source
- user name
- Administrator
The default account in an AD domain is Administrator.
question 4
True or False: Computers in the Domain Controllers group are also members of the Domain Computers group.
- TRUE
- INCORRECT
Although domain controllers are technically computers, they are not included in the Domain Computers group. The Domain Computers group contains all domain-joined computers in an organization, except domain controllers, which belong to the DC group.
question 5
How are security groups different from distribution groups?
- They are exactly the same.
- Security groups are used for computers while distribution groups are used for users.
- Security groups are used for users while distribution groups are used for computers.
- Security groups can be used to grant access to resources, while distribution groups are only used for email communication.
Both are groups, but a security group can be used to allow group members to access a resource, while a distribution group is only used for email communication.
question 6
What is the difference between changing a password and resetting a password?
- Changing a password requires the old password.
- Changing a password does not require the old password.
- Resetting a password will lock the account.
- they are equal
When changing a password, the old password must be entered first. Password reset allows an administrator to replace and set the password without knowing the old one.
question 7
True or False: Adding a computer to Active Directory involves adding the computer to a workgroup.
- TRUE
- INCORRECT
Adding a computer to Active Directory means joining or joining the computer to the domain. An AD computer account is then created for this. A workgroup is a collection of independent computers that do not belong to an AD domain.
question 8
Joining a computer to an AD domain provides which of the following benefits? Please tick the relevant box.
- centralized authentication
- more detailed record
- Centralized management with GPO
- best performance
Active Directory can be used to centrally manage connected computers, including Group Policy Objects. Domain-joined computers are also authenticated using Active Directory user accounts instead of local accounts, which also provide centralized authentication.
question 9
What are Group Policy Objects?
- Special types of containers.
- Special types of computer groups.
- Special types of user groups
- Settings for Computers and User Accounts in AD
GPOs are objects in AD that contain settings and preferences that can be applied to user accounts or computer accounts. GPOs allow for centralized management of accounts and computers.
question 10
What is the difference between a policy and a preference?
- They are exactly the same.
- A policy is used to define a preference.
- AD enforces policy while a local user can change a setting.
- A local user can change a policy while AD is enforcing a configuration.
Policies are settings that are applied and reapplied periodically, while settings are default values for various settings but can be changed by users.
question 11
With a new AD domain, what needs to change before you can target groups of users and computers with GPOs?
- Anything; Default settings are ready.
- You must place users and computers in new OUs.
- You must create an administrator account.
- You must rename the default groups.
Because GPOs can only be applied to sites, domains, and OUs, and the default users and computer groups in AD are not OUs, GPOs cannot target these groups directly. To target specific groups of users or computers, new OUs must be created and users or accounts added to them.
question 12
Choose the correct GPO application order:
- Website -> Domain -> Die
- Die –> Domain –> Website
- Domain -> Site -> The
- Website –> Die –> Domain
When GPOs collide, they are applied first on a site basis and then on a domain basis. Then each OU is applied, from least specific to most specific.
question 13
What can we use to determine which policies apply to a specific machine?
- gpupdate [FALSO]
- A control panel [FALSE]
- A test domain
- An RSOP report
question 14
How does a client find the address of a domain controller?
- It is sent through an AD GPO.
- Send a broadcast to the local network.
- Performs a DNS query and requests the SRV record for the domain.
- It is provided via DHCP.
The client performs a DNS query and requests the SRV record for the domain. The SRV record contains addressing information for the domain controllers in that domain.
question 15
What could be preventing you from logging on to a domain-joined computer? Please tick the relevant box.
- Unable to communicate with domain controller.
- Your computer is connected to WiFi.
- User account is blocked.
- The time and date are wrong.
If, for some reason, the computer cannot communicate with the domain controller, it will not be able to authenticate to AD. Because AD authentication relies on Kerberos for encryption, AD authentication relies on server and client time synchronization within five minutes. And, of course, if the user's account is locked, you won't be able to authenticate to the account or log into the computer.
Centralized administration and LDAP
question 1
Which of these are examples of centralized management? Please tick the relevant box.
- Role-based access control
- Centralized configuration management
- Copy settings to multiple systems
- local authentication
Role-based access control makes managing access rights easier by changing role membership and allowing inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage service and hardware configurations. Centralization makes it easy to propagate changes to multiple systems at the same time.
question 2
Which ones are part of an LDAP entry? Please tick the relevant box.
- unusual name
- common names
- organizational user
- Distinguished Name
The common name contains a description of the object, for example B. the full name of a user account. A distinguished name is the unique name of the entry and includes the attributes and values associated with the entry.
question 3
What exactly does the LDAP bind operation do?
- Modify Entries on a Directory Server
- Looking up information on a directory server
- Authenticates a client with the directory server
- Change the password for a user account on the directory server
The common name contains a description of the object, for example B. the full name of a user account. A distinguished name is the unique name of the entry and includes the attributes and values associated with the entry.
question 4
Which of the following authentication types are supported by the LDAP bind operation? Please tick the relevant box.
- Anonymous
- Simply
- Complex
- SASL
Bind operations support three different authentication mechanisms: (1) Anonymous, which authenticates nothing and allows anyone to query the server; (2) Simple, which consists of sending the password in plain text; and (3) SASL or Simple Authentication and Security Layer, which implies a secure challenge-response authentication mechanism.
Introduction to directory services
question 1
What does a directory server offer?
- A real-time communication service
- A network time service
- A search service for an organization.
- A replication service
A directory service allows members of an organization to look up information about the organization, such as network resources and their addresses.
question 2
What are the benefits of replication? Please tick the relevant box.
- redundancy
- enhanced security
- greater capacity
- reduced latency
Directory server replication provides redundancy as multiple copies of the database are hosted by multiple servers. Aggregated servers that provide lookup services also reduce latency for clients querying the service.
question 3
What is the most used directory service protocol today?
- Directory Access Log
- directory system record
- Lightweight directory access protocol
- Directory operational link management protocol
LDAP is the most popular and widely used directory access protocol today.
peer review
https://drive.google.com/drive/folders/1bvWvKIaWg__NRzQWoO5qnQEFidlHYj3T?usp=sharing
5. Data recovery and backups
disaster recovery plans
question 1
What elements should a disaster recovery plan cover? Please tick the relevant box.
- detection measures
- Precautions
- recovery measures
- Drastic measures
A disaster recovery plan should not just include recovery procedures; It should include detection measures so that you are aware of an incident, as well as preventative measures to prevent a disaster in the first place.
question 2
Why are detections included in a disaster recovery plan?
- you are not
- Why it's important to know when a disaster strikes
- Because they prevent data loss
- Because they make it easy to recover lost data
The sooner you are notified that an incident is occurring, the sooner you can take action to stop it.
question 3
What are good preventative measures to incorporate into your organization? Please tick the relevant box.
- surveillance and alarm systems
- redundant systems
- backups regulares
- Accessible and up-to-date documentation
Good documentation is considered a preventative measure as it can prevent costly mistakes and make it easier to handle system crashes or failures.
question 4
What are good detection measures to incorporate into your organization? Please tick the relevant box.
- environmental monitoring
- Securing firewall rules
- redundant power supplies
- System performance monitoring
By monitoring environmental conditions in a server room, you'll be alerted when something is causing problems with your equipment. System performance monitoring can also alert you to abnormal requests or traffic to a server.
question 5
What are good recovery measures to incorporate into your organization? Please tick the relevant box.
- Restore server settings from backup
- After detailed documentation of the rehabilitation plan
- Internet line outage monitoring
- Redundant server maintenance
Keeping backup copies of server settings makes restoring a damaged system much faster and easier. Detailed documentation on exactly how to do this will also speed up this process.
Data recovery planning
question 1
How to recover after unexpected data loss? Please tick the relevant box.
- Write an autopsy report.
- Recover data from damaged devices.
- Restore data from backups.
- Design a disaster recovery plan.
question 2
Where is the best place to physically store backups?
- And or vegetable garden
- off premises
- in a safe
- in various locations
Ideally, backups should be stored in multiple physical locations to reduce the risk of catastrophically losing backups. Typically, data is backed up somewhere locally and backups are replicated and stored off-site.
question 3
Which one should be included in your backups? Please tick the relevant box.
- firewall settings
- A download folder
- family vacation photos
- sales databases
Business-critical data such as firewall settings and relevant databases should be included in backup plans.
question 4
What is magnetic tape backup media best for?
- long term archive data
- Low latency cached data
- cheap backup systems
- Fast and efficient backups
Magnetic tape media is very inexpensive, but it is also very slow and cumbersome to retrieve data from. This makes it a good choice for archiving old data that is not often needed.
question 5
Why is it important to test backup and recovery procedures? Please tick the relevant box.
- To reduce the size of backup data
- To speed up the backup and restore process
- To ensure backups work and data can be restored from them
- To ensure relevant data is included in backups
It's very important to test your backup and restore procedures to make sure they really work! Backup files may be corrupted or inconsistent, preventing proper recovery. Recovery procedures are also important to test to ensure that critical data can be extracted from backups in the event of a disaster. Disaster testing can also uncover gaps in your backup coverage without risking actual data loss.
question 6
Which of the following backup types are the most space efficient?
- backups completos
- differential backups
- incremental backups
Incremental backups are the most efficient. While they start with a full backup, on later runs they only back up the parts of the files that have changed since the last run.
question 7
True or False: You can use a RAID array and use rsync to copy critical data for backup.
- TRUE
- INCORRECT
A RAID array is not a replacement for a backup system as it does not provide protection against data corruption or deletion.
after dead
question 1
What is the intention behind writing an autopsy?
- Assign blame for mistakes
- To assign legal responsibility
- Learn from mistakes and improve in the future
- Getting people to avoid risky behavior.
An autopsy is designed to investigate what happened around an incident to determine what went wrong so that it can be avoided in the future.
question 2
What should an autopsy schedule include? Please tick the relevant box.
- Measurements before, during and after the event
- A detailed analysis of the incident, including root cause and scope.
- Detailed dates and times
- A summary of the incident and how long it lasted
The timeline should include actions taken before, during, and after the incident, along with the date and time of those actions.
peer review
https://drive.google.com/drive/folders/1tyLdio5ITPl0zW3DCY2R3AvtbUy7pu5l?usp=sharing
6. Final Project
https://drive.google.com/drive/folders/1QmxHOv83DHK_qs2LBZvAIoUvb7FEYhtf?usp=sharing