Course quiz: Introduction to computers and operating systems, and security :Introduction to Computers and Operating Systems and Security (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. True or False: IAM is a cloud-based initiative to protect against hackers.
❌ True
✅ False
Explanation: IAM is NOT only cloud-based. It’s a general security framework for managing identities and access.
2. What does CRM stand for?
❌ Customer Relationship Marketing
✅ Customer Relationship Management
❌ Consumer Reliance Management
3. Azure Files is used for storing large objects.
❌ True
✅ False
Explanation: Azure Blobs store large objects, not Azure Files.
4. Data found in a data warehouse is more easily classified.
✅ True
❌ False
5. Commercial on-premises computing requires more ______.
✅ Hardware
❌ Users
❌ Software
6. Zero Standing Access means:
❌ Limiting the length of access time
❌ Limiting time + scope
✅ Limiting a user’s range of access (no default ongoing access)
7. Zero-day exploit statement
✅ True
❌ False
8. Maintenance in response to failure is called:
✅ Corrective
❌ Routine
❌ Predictive
9. Reasons to avoid a patch (Select all):
✅ It can alter functionality.
❌ It can fix an issue (this is a benefit, not deterrent)
✅ It can break concentration.
10. Getting useful info from raw data = ?
❌ Data integration
✅ Data analysis
❌ Data visualization
11. Elements of threat landscape (Select all):
✅ Potential attackers
✅ Impact of attack
✅ Vulnerabilities of application
✅ Methods of attack
12. Botnet attack definition
❌ Triggering malware by clicking
❌ Preventing access to files
✅ Automated and repetitive attacks on a system
13. Using a meaningful word like pet’s name is safer?
❌ True
✅ False
Explanation: Meaningful words can be guessed.
14. Non-volatile memory persists after shutdown.
✅ True
❌ False
15. Which can be used for processing?
✅ CPU
❌ Keyboard
❌ Monitor
16. Time-sharing OS definition
✅ Quantum allocated to each task
❌ Multi-user by blocking others
❌ Distributed CPUs
17. OS is a small piece of code that allows hardware–software communication.
❌ True
✅ False
Explanation: OS is large and complex, not a small piece.
18. Example of mobile OS
❌ Windows
✅ iOS
❌ macOS
19. Linux is open-source.
✅ True
❌ False
20. Benefit of machine learning
❌ Automatically collects data
❌ Automatically corrects errors
✅ Handles large amounts of data efficiently
21. SMTP definition
❌ Retrieval procedures
❌ Steps to achieve a task
✅ Routing email to destination IP
22. Email client using OneDrive for cloud storage
❌ Gmail
❌ Thunderbird
✅ Outlook
23. Trying to deceive people to get info
❌ Email spoofing
✅ Phishing
❌ Ads
24. Anomaly detection achievable by ML
✅ True
❌ False
25. Fraud detection techniques (Select all)
✅ Machine Learning
✅ Supervised Learning
❌ Object detection
26. CPU response to overheating
❌ Display warning
✅ Throttle clock speed
❌ Increase clock speed
27. Data warehouse more sophisticated than data lake
✅ True
❌ False
28. Quarantining definition
❌ Blocklists
❌ Allowing only reputable senders
✅ Separating suspect emails
29. Business software definition
❌ True
✅ False
Explanation: Business software supports operations, not product creation.
30. CRM predates LOB systems
❌ True
✅ False
Explanation: LOB systems existed before CRM platforms.
🧾 SUMMARY TABLE
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | False | IAM is broader than cloud |
| 2 | Customer Relationship Management | CRM meaning |
| 3 | False | Azure Blobs store large objects |
| 4 | True | Warehouse = structured data |
| 5 | Hardware | On-premises vs cloud |
| 6 | Limiting range of access | ZSA |
| 7 | True | Zero-day exploit |
| 8 | Corrective | Failure-based maintenance |
| 9 | Alter functionality, Break concentration | Patch concerns |
| 10 | Data analysis | Raw data ⇒ insights |
| 11 | All options | Threat landscape |
| 12 | Automated repetitive attack | Botnet |
| 13 | False | Weak password choice |
| 14 | True | Non-volatile memory |
| 15 | CPU | Processing |
| 16 | Quantum time-sharing | OS type |
| 17 | False | OS is not small code |
| 18 | iOS | Mobile OS |
| 19 | True | Linux open-source |
| 20 | Handles large data | ML benefit |
| 21 | Routing email | SMTP |
| 22 | Outlook | Cloud storage |
| 23 | Phishing | Social engineering |
| 24 | True | ML detects anomalies |
| 25 | ML, Supervised ML | Fraud detection |
| 26 | Throttle speed | CPU protection |
| 27 | True | Warehouse > Lake |
| 28 | Email quarantine | Email security |
| 29 | False | Business software definition |
| 30 | False | LOB predates CRM |