GOOGLE IT SUPPORT PROFESSIONAL CERTIFICATE

Course 3 – Operating Systems and You: Becoming A Power User

Week 6: Operating Systems in Practice

Coursera Study Guide

TABLE OF CONTENT

Congratulations, you’ve made it to the final week in the course! In the last week of this course, we will cover some of the practical aspects of operating systems that you’ll use all the time in IT Support. We will cover remote access and how to troubleshoot a computer from afar. We’ll explore virtualization tools to manage and remove virtual instances, use logs for system monitoring, and show you a few different techniques for OS deployment. By the end of this module, you will apply all the skills from this course to debug some issues within Windows and Linux OS. Good luck!

Learning Objectives

  • Be able to remotely access a Windows or Linux machine.
  • Read and troubleshoot logs.
  • Utilize disk cloning tools to make an image.

PRACTICE QUIZ:  REMOTE ACCESS

1. True or false: Windows processes can operate independently of their parents.

  • TRUE (CORRECT)
  • FALSE

Great work! Unlike in Linux, after a child process is created in Windows and inherits its parent’s environment, the parent process can be terminated and the child will continue to run.

PRACTICE QUIZ:  MANAGING PROCESSES

1. Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?

  • pscp.exe (CORRECT)
  • psftp.exe
  • pageant.exe

Great work! The pscp.exe tool, or PuTTY Secure Copy Client, will let you copy files to and from remote computers using SCP.

PRACTICE QUIZ:  LOGGING

1. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

  • System
  • Application and Services
  • Security (CORRECT)

Nice job! The Security log would be a good place to start when troubleshooting login issues.

2. In what log files can you find information about bootup errors? Check all that apply.

  • /var/log/syslog (CORRECT)
  • /var/log/auth.log
  • /var/log/kern.log (CORRECT)
  • /var/log/mail.log

You nailed it! You can find log information about bootup issues in kern.log as well as the syslog.

3. In what log files can you find information about authentication errors?

  •  /var/log/syslog
  • /var/log/auth.log (CORRECT)
  • /var/log/kern.log
  •  /var/log/mail.log

The auth.log file contains authentication log messages.

4. For an ssh connection to work, which of the following need to be true? Check all that apply.

  • SSH is installed on client. (CORRECT)       
  • The SSH server is running on the host you want to connect to. (CORRECT)
  • VPN needs to be set up.
  • You need to specify a hostname to SSH into. (CORRECT)

Great job! To SSH into a remote host, you’ll need all of these things setup.