Test Your Knowledge - Python and Automation - Coursera100
Test Your Knowledge - Python and Automation - Coursera100
Volver Español
Cuestionario Práctico • 8 min • 4 total de puntos
¡Felicitaciones!
Menú ¡Aprobaste!
Calificación recibida 100 % Para Aprobar 75 % o más
Cuestionario Práctico
1. Which of the following potential signs of suspicious activity can you track with automated Python programs? Select all that apply. 1 / 1 punto
EnvíaWhether
tu tareaseveral failed login attempts occurred within a short span of time
Correcto
Probar de nuevo
Using automated Python programs, you can track whether several failed login attempts occurred within a short span of time, whether login attempts occurred outside of normal work hours, and whether login attempts occurred from IP addresses that are not established work zones.
In all of these cases, you can obtain the data needed for Python automation.
Whether
Recibe login attempts occurred from IP addresses that are not established work zones
la calificación
Para AprobarCorrecto
75 % o más
Using automated Python programs, you can track whether several failed login attempts occurred within a short span of time, whether login attempts occurred outside of normal work hours, and whether login attempts occurred from IP addresses that are not established work zones.
In all of these cases, you can obtain the data needed for Python automation.
Tu calificación
2. Which Python component contributes to automation by allowing you to perform the same actions a certain number of times based on a sequence? 1 / 1 punto
for loops
while loops
Conditional statements
Bracket notation
Correcto
Python for loops contribute to automation by allowing you to perform the same action a certain number of times based on a sequence.
3. Why is knowing how to work with files important for automation? 1 / 1 punto
Correcto
Knowing how to work with files is important for automation because cybersecurity-related information is often found in log files.
4. Which of the following are common file formats for security logs? Select all that apply. 1 / 1 punto
.txt
Correcto
Common file formats for security logs include .txt and .csv. Both file formats are types of text files, meaning they only contain plain text. It is easy to extract data from .txt and .csv files.
.csv
Correcto
Common file formats for security logs include .txt and .csv. Both file formats are types of text files, meaning they only contain plain text. It is easy to extract data from .txt and .csv files.
.jpeg
.gif