Skip to content

Course quiz: Introduction to computers and operating systems, and security :Introduction to Computers and Operating Systems and Security (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. True or False: IAM is a cloud-based initiative to protect against hackers.

❌ True
False
Explanation: IAM is NOT only cloud-based. It’s a general security framework for managing identities and access.


2. What does CRM stand for?

❌ Customer Relationship Marketing
Customer Relationship Management
❌ Consumer Reliance Management


3. Azure Files is used for storing large objects.

❌ True
False
Explanation: Azure Blobs store large objects, not Azure Files.


4. Data found in a data warehouse is more easily classified.

True
❌ False


5. Commercial on-premises computing requires more ______.

Hardware
❌ Users
❌ Software


6. Zero Standing Access means:

❌ Limiting the length of access time
❌ Limiting time + scope
Limiting a user’s range of access (no default ongoing access)


7. Zero-day exploit statement

True
❌ False


8. Maintenance in response to failure is called:

Corrective
❌ Routine
❌ Predictive


9. Reasons to avoid a patch (Select all):

It can alter functionality.
❌ It can fix an issue (this is a benefit, not deterrent)
It can break concentration.


10. Getting useful info from raw data = ?

❌ Data integration
Data analysis
❌ Data visualization


11. Elements of threat landscape (Select all):

Potential attackers
Impact of attack
Vulnerabilities of application
Methods of attack


12. Botnet attack definition

❌ Triggering malware by clicking
❌ Preventing access to files
Automated and repetitive attacks on a system


13. Using a meaningful word like pet’s name is safer?

❌ True
False
Explanation: Meaningful words can be guessed.


14. Non-volatile memory persists after shutdown.

True
❌ False


15. Which can be used for processing?

CPU
❌ Keyboard
❌ Monitor


16. Time-sharing OS definition

Quantum allocated to each task
❌ Multi-user by blocking others
❌ Distributed CPUs


17. OS is a small piece of code that allows hardware–software communication.

❌ True
False
Explanation: OS is large and complex, not a small piece.


18. Example of mobile OS

❌ Windows
iOS
❌ macOS


19. Linux is open-source.

True
❌ False


20. Benefit of machine learning

❌ Automatically collects data
❌ Automatically corrects errors
Handles large amounts of data efficiently


21. SMTP definition

❌ Retrieval procedures
❌ Steps to achieve a task
Routing email to destination IP


22. Email client using OneDrive for cloud storage

❌ Gmail
❌ Thunderbird
Outlook


23. Trying to deceive people to get info

❌ Email spoofing
Phishing
❌ Ads


24. Anomaly detection achievable by ML

True
❌ False


25. Fraud detection techniques (Select all)

Machine Learning
Supervised Learning
❌ Object detection


26. CPU response to overheating

❌ Display warning
Throttle clock speed
❌ Increase clock speed


27. Data warehouse more sophisticated than data lake

True
❌ False


28. Quarantining definition

❌ Blocklists
❌ Allowing only reputable senders
Separating suspect emails


29. Business software definition

❌ True
False
Explanation: Business software supports operations, not product creation.


30. CRM predates LOB systems

❌ True
False
Explanation: LOB systems existed before CRM platforms.



🧾 SUMMARY TABLE

Q# Correct Answer Key Concept
1 False IAM is broader than cloud
2 Customer Relationship Management CRM meaning
3 False Azure Blobs store large objects
4 True Warehouse = structured data
5 Hardware On-premises vs cloud
6 Limiting range of access ZSA
7 True Zero-day exploit
8 Corrective Failure-based maintenance
9 Alter functionality, Break concentration Patch concerns
10 Data analysis Raw data ⇒ insights
11 All options Threat landscape
12 Automated repetitive attack Botnet
13 False Weak password choice
14 True Non-volatile memory
15 CPU Processing
16 Quantum time-sharing OS type
17 False OS is not small code
18 iOS Mobile OS
19 True Linux open-source
20 Handles large data ML benefit
21 Routing email SMTP
22 Outlook Cloud storage
23 Phishing Social engineering
24 True ML detects anomalies
25 ML, Supervised ML Fraud detection
26 Throttle speed CPU protection
27 True Warehouse > Lake
28 Email quarantine Email security
29 False Business software definition
30 False LOB predates CRM