GOOGLE IT SUPPORT PROFESSIONAL CERTIFICATE
Course 3 – Operating Systems and You: Becoming A Power User
Week 6: Operating Systems in Practice
Coursera Study Guide
Click to Enroll in Coursera Google IT Support Professional Certificate
TABLE OF CONTENT
Congratulations, you’ve made it to the final week in the course! In the last week of this course, we will cover some of the practical aspects of operating systems that you’ll use all the time in IT Support. We will cover remote access and how to troubleshoot a computer from afar. We’ll explore virtualization tools to manage and remove virtual instances, use logs for system monitoring, and show you a few different techniques for OS deployment. By the end of this module, you will apply all the skills from this course to debug some issues within Windows and Linux OS. Good luck!
Learning Objectives
- Be able to remotely access a Windows or Linux machine.
- Read and troubleshoot logs.
- Utilize disk cloning tools to make an image.
PRACTICE QUIZ: REMOTE ACCESS
1. True or false: Windows processes can operate independently of their parents.
- TRUE (CORRECT)
- FALSE
Great work! Unlike in Linux, after a child process is created in Windows and inherits its parent’s environment, the parent process can be terminated and the child will continue to run.
PRACTICE QUIZ: MANAGING PROCESSES
1. Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
- pscp.exe (CORRECT)
- psftp.exe
- pageant.exe
Great work! The pscp.exe tool, or PuTTY Secure Copy Client, will let you copy files to and from remote computers using SCP.
PRACTICE QUIZ: LOGGING
1. If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?
- System
- Application and Services
- Security (CORRECT)
Nice job! The Security log would be a good place to start when troubleshooting login issues.
2. In what log files can you find information about bootup errors? Check all that apply.
- /var/log/syslog (CORRECT)
- /var/log/auth.log
- /var/log/kern.log (CORRECT)
- /var/log/mail.log
You nailed it! You can find log information about bootup issues in kern.log as well as the syslog.
3. In what log files can you find information about authentication errors?
- /var/log/syslog
- /var/log/auth.log (CORRECT)
- /var/log/kern.log
- /var/log/mail.log
The auth.log file contains authentication log messages.
4. For an ssh connection to work, which of the following need to be true? Check all that apply.
- SSH is installed on client. (CORRECT)
- The SSH server is running on the host you want to connect to. (CORRECT)
- VPN needs to be set up.
- You need to specify a hostname to SSH into. (CORRECT)
Great job! To SSH into a remote host, you’ll need all of these things setup.
Subscribe to our site
Get new content delivered directly to your inbox.
Quiztudy Top Courses
Popular in Coursera
- Meta Marketing Analytics Professional Certificate.
- Google Digital Marketing & E-commerce Professional Certificate.
- Google UX Design Professional Certificate.
- Meta Social Media Marketing Professional Certificate
- Google Project Management Professional Certificate
- Meta Front-End Developer Professional Certificate
Liking our content? Then, don’t forget to ad us to your BOOKMARKS so you can find us easily!