Which of these is a GUI? Check all that apply.
- BASH
- MS-DOS
- iOS
- Chrome OS
Home » Google IT Support Professional Certificate Answers » Page 2
Google IT Support Professional Certificate Answers
Whether you’re just getting started or want to take the next step in the high-growth field of IT, professional certificates from Google can help you gain in-demand skills. You’ll learn about troubleshooting, customer support, system administration, Python and more.
This certification is part of Google Career Certificates .
Complete a Google Career Certificate to get exclusive access to CareerCircle, which offers free 1-on-1 coaching, interview and career support, and a job board to connect directly with employers, including over 150 companies in the Google Career Certificates Employer Consortium.
All answers to pass this certification are only in our .PDF file, you can buy and download here:
Questions:
How to Count in Binary
In this activity, you will use the tool below to convert a decimal number into binary form.
Remember, in binary, the value is considered to be “ON” when a 1 is used. When a 0 is used, the value is considered to be “OFF.”
Click the binary bits necessary to compute the decimal value on the left column. There are 10 exercises to complete.
For example, the picture below represents the number 3 in binary.
When you're done, click the "Check Answers" button. To submit this quiz for a grade, close the full screen quiz and click the "Submit Quiz" button.
Quiz consideration:
Good luck!
Assemble a Computer
In this quiz, you will assemble a computer virtually by dragging-and-dropping the components to the corresponding sections.
In the CPU section, you will need to place the 4 items in the correct order, from bottom to top (as shown in the picture below), as if it were a physical computer.
Click the "Check" button to check your answers. Correct placements will be outlined in green, and incorrect placements will be outlined in red. If you've made a mistake, edit your placements or click the arrow to reset all placements and try again. When you're done, click the "Submit" button for a grade.
Quiz consideration:
Good luck!
The Modern Computer
3.Which component functions as the computer’s short-term memory?
Components
Starting It Up
What is an Operating System?
Installing an Operating System
Which group manages the registration of domain names?
What was the biggest problem with the earliest version of the Internet in the late 1960s?
Limitations of the Internet
Networking
Shuffle Q/A
Introduction to Software
Interacting with Software
Documentation - Troubleshooting Best Practices
You receive a phone call from a remote user, saying they cannot connect to the company server. The user is in a rush and is frustrated. You take the call and start your interaction with the user. The user, having some computer knowledge, tells you what steps they perform to try to solve the problem. In order to find the root cause, you need to re-try some of the same steps the user performed. Which of the following is the best way to communicate with the user the steps you want to perform?
The help desk receives a call from a customer/user with the problem “My system is running too slowly.” Select the best ticket documentation.
Customer Service
Tech: Hi there, how can I help you?
User: My computer is really slow, and I can barely use it. Can you help me figure out what's wrong?
Tech: It looks like this is a personal computer. Are you talking about your work computer?
User: Uh, no, this is the one that I need help with. I figured you’re good with computers, and you could help. My daughter needs it for a school assignment that’s due tomorrow, but it's too slow for her to get anything done.
What would you do?
Scenario: Phone call
Anastasia: Thanks for calling. My name is Anastasia. How can I help you?
Ling: Hi, Anastasia. This is Ling. I need to reset my account password.
Anastasia: Hi, Ling. I’d be happy to help you with that, but first I need to verify your identity. Can you do a video call with me through Skype?
Ling: I can’t get into my work account. That's why I’m calling.
What would you do in this situation? Check all that apply.
How would you respond to the user?
My machine is saying I have to reboot, but this is silly. I have a ton of processes running, I don’t want to have to reload everything. This is a waste of time. I’ve included a screenshot of the message. Please advise.
-Aditya Choose the best response
15.Situacion: You are working as an IT support specialist and receive the following request thorough chat:
Name: Yuki Saitō
Customer number: 674213
Issue: I need more bandwidth
Chat log:
Mia: Hi Yuki, how are you today? I see that you are concerned about needing more bandwidth. I’d be happy to help.
Yuki: Thanks, I really need it!
Mia: Can I ask what you mean by “needing more bandwidth?”
Yuki: I mean that everytime I try to use my computer after lunch, it’s incredibly slow. I think I’m using all the bandwidth in the morning.
What do you do next?
Troubleshooting Best Practices
You receive a phone call from a remote user, saying they cannot connect to the company server. The user is in a rush and is frustrated. You take the call and start your interaction with the user. The user, having some computer knowledge, tells you what steps they perform to try to solve the problem. In order to find the root cause, you need to re-try some of the same steps the user performed. Which of the following is the best way to communicate with the user the steps you want to perform?
Shuffle Q/A
You are an IT support specialist for a computer repair shop. A customer brings their computer and explains their problem. You need to perform some basic troubleshooting steps that take about 30 minutes. Which is the best way to interact with the customer?
A user contacts you through chat, saying they are unsuccessfully trying to access the corporate email app. You start troubleshooting and realize what the problem is. What should you do?
The help desk receives a call from a customer/user with the following problem: “I’m unable to log-in to my account.” Select the best ticket documentation from the following:
The help desk receives a call from a customer/user with the problem “My system is running too slowly.” Select the best ticket documentation.
User: Hi! I have a problem with my laptop. It is totally broken. I think I need a new one.
You: Hi! What is the problem?
User: The laptop does not turn on.
You: Sorry to hear that; let me try. You are right, it is not turning on.
What should be your next step:
Layers in Networking Models
Let's test your knowledge of the five-layer networking model presented in this course.
This quiz consists of 2 parts:
Quiz consideration:
Good luck!
Routing Paths and Subnets
Question 1
Let’s see how much you’ve learned about routing paths and subnetting! In this activity, you are given a bunch of source and destination IP address pairs. Your task is to route each of these packets from the correct source network to the correct destination network.
Step 1: You will be presented 8 source and destination IP address pairs in the table below.
Step 2: You will mimic how the packets travel from the source IP address to the destination IP address within the network. Click the network source (the corresponding orange bubble) and click all the networks it needs to use in order to reach the destination network. You will need to click each network in the right order.
Step 3: After you’ve selected the source and destination networks, click the “Check” button. Some of these address pairs may not be represented by the networks available. If that’s the case, click the “Source or destination not present” button. If you make a mistake, click the “Reset” button to try again.
Step 4: Once you have correctly answered a question, move on to the next question by clicking on the next question arrow. There are 8 different questions.
Step 5: After you’ve completed all routing paths listed in the table, close the quiz and click the “Submit Quiz” button for a grade.
TCP/IP
Networking Devices
The Physical Layer
The Data Link Layer
Networking Basics
21 Which protocol provides mechanisms ensuring data is reliably delivered?
Shuffle Q/A
The Network Layer
Subnetting
Your IP address is 192.168.8.34, and your subnet mask is 255.255.0.0. What part of the subnet mask represents the subnet ID?
Routing
The Network Layer
Shuffle Q/A
The Transport Layer
The Application Layer
The Transport and Application Layer
Shuffle Q/A
The Five-Layer Network Model
Use the following scenario to answer the 10 questions below:
You have 3 networks (A, B, and C) and 2 routers (Y and Z).
Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.
Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.
Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.
Shuffle Q/A
Use the following scenario to answer the 10 questions below:
You have 3 networks (A, B, and C) and 2 routers (Y and Z).
Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.
Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.
Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.
Name Resolution
Name Resolution in Practice
Dynamic Host Configuration Protocol
Network Address Translation
VPNs & Proxies
Networking Services Simulation
Step 1: Read the manager’s request in the top-left corner of the screen. The manager’s request will be in the blue speech bubble next to the graphic of a person.
Step 2: Drag and drop the correct network device or server icon (e.g. DHCP) into the "drop here" box on the screen. If you make a mistake, click the back arrow button and try again.
Step 3: After you have completed all requests, close the quiz window and click the “Submit Quiz” button.
Good luck!
IMPORTANT: At the end of the interactive you will need to select the next arrow button one more time before clicking SUBMIT to receive a grade.
We need to be connected to the Internet! - Router
We’re running out of IP addresses. We’ll need to have a way to use non-routable address space! - NAT
People can’t remember so many IP addresses! - DNS
I’m worried people are going to break into our network - Firewall
Configuring the network setting for every desktop is becoming a real problem! - DHCP
We need to reduce internal collision domains - Switch
Our traveling sales people need to access internal resources on the road! - VPN
Networking Services
Shuffle Q/A
Wireless Channels
Latest Submission Grade: 100%
Question 1
Let’s see how much you learned about wireless channels and how to select the optimal setup!
Here’s the scenario: You’re an IT Support Specialist that has setup three wireless channels for a company. As time goes on, neighboring companies have their own wireless networks coming into operation. This causes network interference between your networks and their network.
Step 1: You’ll see three wireless channels with access points that you control. These are represented by the orange bubbles on the screen. You can drag these around on the screen using the grey rectangle at the top of the bubble.
Step 2: After a few seconds, a new wireless network will appear, which is represented by a different colored bubble. This represents the competing wireless networks.
Step 3: Minimize network interference by moving your wireless channels so there’s as little overlap as possible for all wireless channels.
Step 4: Once you’ve best positioned the wireless channels, click “Submit.”
Step 5: If you successfully minimized network interference, click the “Next” button and you’ll respond to a new scenario based on your previous answer. You have 5 scenarios to complete for this activity. If your answer is wrong, click “Reset” and try again.
Neighbouring wifi has been set up at 2.447 GHz
Neighbouring wifi has been set up at 2.467 GHz
Which form of Digital Subscriber Line (DSL) features differing upload and download speeds?
POTS and Dial-up
Broadband Internet
WANs
Wireless Networking
Limitations of the Internet
Shuffle Q/A
IPv6 Compression
558c:0000:0000:d367:7c8e:1216:0000:66be - 558c::d367:7c8e:1216:0:66be
00c8:b434:06ee:ec2f:03c9:01ce:765d:a66b - c8:b434:6ee:ec2f:3c9:1ce:765d:a66b
5d66:5ec9:0046:0000:2576:004f:7159:0639 - 5d66:5ec9:46:0:2576:4f:7159:639
0e56:11c2:0e75:8d23:3528:7e0d:419b:bdce - e56:11c2:e75:8d23:3528:7e0d:419b:bdce
2b06:0000:0000:1f2b:d77f:0000:0000:89ce - 2b06::1f2b:d77f:0:0:89ce
7d2b:00a9:a0c4:0000:a772:00fd:a523:0358 - 7d2b:a9:a0c4:0:a772:fd:a523:358
9930:cafa:0000:0052:04cc:7b7a:0037:27e6 - 9930:cafa:0:52:4cc:7b7a:37:27e6
00eb:0000:0000:0000:d8c1:0946:0272:0879 - eb::d8c1:946:272:879
ad93:a0e4:a9ce:32fc:cba8:15fe:ed90:d768 - ad93:a0e4:a9ce:32fc:cba8:15fe:ed90:d768
8bfa:99f0:d4c5:0b8c:0f6f:04df:2804:283d - 8bfa:99f0:d4c5:b8c:f6f:4df:2804:283d
Verifying Connectivity
1.The protocol used to communicate network errors is known as __________.
Digging into DNS
The Cloud
IPv6
Troubleshooting and the Future of Networking
Shuffle Q/A
Basic Commands
File and Text Manipulation
apple.txt
banana.jpg
chocolate.txt
orange.txt
What command can be used to search for the word "fruit" in the text files? Check all that apply.
Using Logs to Help You Track Down an Issue in Windows
Using Logs to Help You Track Down an Issue in Linux
Permissions
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What does the first character of output signify?
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: Who does the last trio of bits (r--) in the file permission and attributes refer to?
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What permissions does the second trio of bits (-wx) give you? Check all that apply.
Users, Administrators,Groups and Permissions
Shuffle Q/A
Software Distribution
Package Managers
Device Software Management
Package and Software Management
Which of the following package formats is used by the Windows Store to distribute universal Windows platform apps?
Shuffle Q/A
Partitioning and Formatting a Disk Drive in Linux
Filesystem Types
What must you do before trying to manually repair a file system with the fsck command?
Filesystems
Shuffle Q/A
Life of a Process
Managing Processes
Process Utilization
Process Management
$ less /etc/myfile | grep Hello
Shuffle Q/A
Remote Access
Logging
Operating System in Practice
Shuffle Q/A
Systems Administration Tasks
A user is setting their computer’s hostname and username. In which stage of the hardware lifecycle does this scenario belong to?
What is System Administration?
Shuffle Q/A
Which one of the following options allows you to access a system remotely?
If you want to integrate your DHCP server with DNS, which of the following information will you need to configure DHCP? Select all that apply.
Intro to IT Infrastructure Services
Physical Infrastructure Services
Network Services
Network Services
Shuffle Q/A
Which file system protocols are intended for network use? Select all that apply.
Software Services
File, Print, and Platform Services
Troubleshooting Platform Services
Software and Platform Services
Shuffle Q/A
A Lightweight Directory Access Protocol (LDAP) entry reads as follows: dn: CN=John Smith ,OU=Sysadmin,DC=jsmith,DC=com. \n. What is the common name of this entry?
Introduction to Directory Services
Centralized Management and LDAP
Active Directory
Directory Services
Shuffle Q/A
Which of the following is an advantage of off-site backups?
Planning for Data Recovery
Disaster Recovery Plans
Post-Mortems
Data Recovery & Backups
Shuffle Q/A
What type of malware allows an attacker to modify an operating system using admin level tools?
What type of attack involves injecting malicious code into a website to hijack a session cookie?
Malicious Software
Network Attacks
Other Attacks
Understanding Security Threats
Shuffle Q/A
Symmetric Encryption
Public Key or Asymmetric Encryption
Hashing
Cryptography Applications
Practice Quiz - Pelcgbybtl (Cryptology)
Authentication
Authorization and Accounting
Authentication, Authorization, Accounting Quiz
Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this?
Shuffle Q/A
Secure Network Architecture
Wireless Security
Network Monitoring
Securing Your Networks
What is a class of vulnerabilities that are unknown before they are exploited?
Securely storing a recovery or backup encryption key is referred to as _______.
System Hardening
Application Hardening
Defense in Depth
Shuffle Q/A
Risk in the Workplace
Users
Incident Handling
Creating a Company Culture for Security
Shuffle Q/A
Select all that apply.
A co-worker needs to share a sensitive file with you, but it is too large to send via an encrypted email. The co-worker works out of a remote office. You work at headquarters. Which of these options would most likely be approved by the company’s security policies? Select all that apply.
Your company wants to establish good privacy practices in the workplace so that employee and customer data is properly protected. Well-established and defined privacy policies are in place, but they also need to be enforced. What are some ways to enforce these privacy policies? Select all that apply.
Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL
Hands-on with Hashing
Introduction to tcpdump
Related Google Career Certificates:
By vmartinez
Which of these is a GUI? Check all that apply.
By vmartinez
What is the last step in booting a computer?
By vmartinez
What are the main components of file management? Check all that apply.
By vmartinez
What are the two main parts that make up an operating system?
By vmartinez
What function does a driver perform on the computer?
By vmartinez
Where are the BIOS settings stored?