0% found this document useful (0 votes)
159 views

Test Your Knowledge - Python and Automation - Coursera100

The document is a quiz about using Python for automation. It contains 4 multiple choice questions that test knowledge of how Python can be used to automate tasks like tracking suspicious login activity, using for loops to perform repetitive tasks, why working with files is important for automation tasks that involve security logs, and common file formats for security logs like .txt and .csv.

Uploaded by

Mario 1229
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views

Test Your Knowledge - Python and Automation - Coursera100

The document is a quiz about using Python for automation. It contains 4 multiple choice questions that test knowledge of how Python can be used to automate tasks like tracking suspicious login activity, using for loops to perform repetitive tasks, why working with files is important for automation tasks that involve security logs, and common file formats for security logs like .txt and .csv.

Uploaded by

Mario 1229
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Test your knowledge: Python and automation

Volver Español
Cuestionario Práctico • 8 min • 4 total de puntos

¡Felicitaciones!
Menú ¡Aprobaste!
Calificación recibida 100 % Para Aprobar 75 % o más
Cuestionario Práctico

Test your knowledge: Python and automation


Ir al siguiente elemento

Revisar los objetivos de aprendizaje

1. Which of the following potential signs of suspicious activity can you track with automated Python programs? Select all that apply. 1 / 1 punto

EnvíaWhether
tu tareaseveral failed login attempts occurred within a short span of time

Correcto
Probar de nuevo
Using automated Python programs, you can track whether several failed login attempts occurred within a short span of time, whether login attempts occurred outside of normal work hours, and whether login attempts occurred from IP addresses that are not established work zones.
In all of these cases, you can obtain the data needed for Python automation.

Whether
Recibe login attempts occurred from IP addresses that are not established work zones
la calificación

Para AprobarCorrecto
75 % o más
Using automated Python programs, you can track whether several failed login attempts occurred within a short span of time, whether login attempts occurred outside of normal work hours, and whether login attempts occurred from IP addresses that are not established work zones.
In all of these cases, you can obtain the data needed for Python automation.
Tu calificación

100 %Whether phishing attempts occurred through in-person interactions


Whether login attempts occurred outside of normal work hours
Ver comentarios
Correcto
Conservaremos tu puntaje
Using más alto.
automated Python programs, you can track whether several failed login attempts occurred within a short span of time, whether login attempts occurred outside of normal work hours, and whether login attempts occurred from IP addresses that are not established work zones.
In all of these cases, you can obtain the data needed for Python automation.

Me gusta No me gusta Informar de un problema

2. Which Python component contributes to automation by allowing you to perform the same actions a certain number of times based on a sequence? 1 / 1 punto

for loops

while loops

Conditional statements

Bracket notation

Correcto
Python for loops contribute to automation by allowing you to perform the same action a certain number of times based on a sequence.

3. Why is knowing how to work with files important for automation? 1 / 1 punto

String and list methods are only accessible through files.

It is necessary to save a file in order to review what you have automated.

Cybersecurity-related information is often found in log files.

In order to create a function, it's necessary to incorporate a file into it.

Correcto
Knowing how to work with files is important for automation because cybersecurity-related information is often found in log files.

4. Which of the following are common file formats for security logs? Select all that apply. 1 / 1 punto

.txt

Correcto
Common file formats for security logs include .txt and .csv. Both file formats are types of text files, meaning they only contain plain text. It is easy to extract data from .txt and .csv files.

.csv

Correcto
Common file formats for security logs include .txt and .csv. Both file formats are types of text files, meaning they only contain plain text. It is easy to extract data from .txt and .csv files.

.jpeg

.gif

You might also like