TOP REVIEWS FROM CYBERSECURITY COMPLIANCE FRAMEWORK & SYSTEM ADMINISTRATION
by SPNov 19, 2020
Highly structured course on Cyber Security compliance. Every cybersecurity domain person get clear understanding on compliance. System admin parts are explained well
by NMJul 15, 2022
My faviorite course of the series so far. It felt like more of an accoumplishment then the past courses, because this one actually gets into the various methods of protecting data/systems/network.
by DPAug 19, 2022
Excellent course for beginners. Just a minor glitch where one of the instructors in one of the cryptography modules refers to the well-known cryptographer Bill Schneier (instead of Bruce).
by ASJun 27, 2020
Course is great only Presentation is not good. This courses uses slides with audio which is not intaractive. also you should add some virtual labs to the course like the courses offered by google.
View all reviews
Latest Submission Grade: 91.66% Broken computers are being eco-recycled by the user. Which stage of the hardware lifecycle does this scenario belong to? The retirement stage of the hardware
lifecycle is when a computer is completely broken or unsalvageable, and needs to be recycled. The machine has to be returned to the vendor for proper recycling. Which stage of the hardware lifecycle does this scenario belong to?Question 1
Question 2
- Procurement
- Deployment
- Maintenance
- Retirement
The retirement stage of the hardware cycle can include situations where a vendor recycles the machines.
Question 3
The IT department sets up a user account and software. Which stage of the hardware lifecycle does this situation belong to?
- Procurement
- Deployment
- Maintenance
- Retirement
The deployment stage of the hardware lifecycle usually occurs when a machine is first set up, like in this example.
Question 4
A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
- Procurement
- Deployment
- Maintenance
- Retirement
The maintenance stage of the hardware lifecycle can include situations where machines are replaced because of hardware issues. This isn't the same as full retirement, since the machine is still being used.
Question 5
Which type of server hardware is the most space-efficient?
- Blade server
- Rack server
- KVM switch
- Tower server
Blade servers are like rack servers, but even thinner! Very space-saving.
Question 6
Which of these are likely considerations for developing a computer policy? Check all that apply.
- Whether users should be able to install software
- Whether you should set a device password on an employee's company phone
- Whether users should be able to view non-work-related websites, like Facebook
- Whether or not users should share their passwords
Question 7
An employee is leaving your company. Which of these steps are appropriate to take during offboarding? Check all that apply.
- Wipe the machine for future use
- Make a copy of the user's files
- Ask the user for their logon information
- Remove the user's access to IT resources
If a user leaves the company, you’ll also have to remove their access from IT resources.
Question 8
What are some important elements of working with vendors as a sysadmin? Check all that apply.
- Independently approve vendor relationships without management permission
- Scheduling on-site maintenance [MAYBE CORRECT]
- Establishing relationships with vendors
- Procure hardware
Question 9
Which methods are commonly used by sysadmins to organize issues? Check all that apply.
- Random machine checks
- Ticketing system
- Daily checks on each machine
- Service monitoring alerts
Question 10
Which type of server most closely resembles a desktop computer in appearance?
- DNS server
- Rack server
- Blade server
- Tower server
Server hardware can come in lots of different forms: they can be towers that sit upright and look very similar to the desktops we’ve seen
Question 11
Which might have an IT infrastructure run by a single person?
- Apple
- Hometown Independent Computer Company, LLC
In smaller companies, it’s usually a single person who manages an entire company’s IT infrastructure.
Question 12
Which are potential responsibilities of a sysadmin? (Check all that apply)
- Database administration
- Technical support
- Network administration
- payroll administration