All Coursera Quiz Answers

Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers

In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security | Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers with you..

Enroll Link: Connect and Protect: Networks and Network Security


Also Visit:ย  Connect and Protect: Networks and Network Security Weekly challenge 4 Quiz Answers


 

Weekly challenge 1 Quiz Answers

Question 1)
What type of network spans an office building, a school, or a home?

  • WAN
  • Modem
  • LAN
  • Cloud

Question 2)
A _____ broadcasts information to every device on the network.

  • hub
  • router
  • switch
  • modem

Question 3)
Which network device makes connections between specific devices on a network by sending and receiving data between them?

  • A switch
  • A router
  • A hub
  • A modem

Question 4)
What are some of the benefits cloud service providers (CSPs) offer security professionals? Select all that apply.

  • CSP servers, applications, and network services are hosted on local physical devices.
  • CSPs offer online services and web applications that can be accessed from any location.
  • CSPs can save an organization money by offering processing power that is only paid for as needed.
  • CSPs provide business analytics to monitor web traffic and sales.

Question 5)
What is the purpose of the footer of a data packet?

  • To contain the source IP address
  • To signal to the receiving device that the packet is finished
  • To identify the message to be transmitted to the receiving device
  • To show the MAC address of the destination device

Question 6)
What are the three main categories of services that CSPs provide? Select all that apply.

  • Platform as a service (PaaS)
  • Software as a service (SaaS)
  • Desktop as a service (DaaS)
  • Infrastructure as a service (IaaS)

Question 7)
Which one of the following port numbers is used for email traffic?

  • 20
  • 443
  • 23
  • 25

Question 8)
Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 9)
Which of the following addresses is an accurate IPv4 address?

  • 1001.2345.3234.5678
  • 129.168.10.25678.1
  • 192.168.0.2
  • 100.234.56.1.3

Question 10)
Which of the following addresses is an accurate IPv6 address?

  • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
  • fda2::7361:135b::38f5:c8bd:1b3e:2578
  • a360::abf7:h234:0011:g126:1130::ffj2
  • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff

Question 11)
Fill in the blank: A computer sends information to the router and the router then transfers information through a ____ to the internet.

  • hub
  • LAN
  • modem
  • switch

Question 12)
Fill in the blank: A ___ is a device that makes connections between specific devices on a network by sending and receiving data between them.

  • switch
  • hub
  • modem
  • router

Question 13)
What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.

  • Increased scalability
  • Decreased cost
  • Increased attack surface
  • Decreased reliability

Question 14)
A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?

  • 40
  • 443
  • 25
  • 20

Question 15)
A security analyst uses the TCP/IP model to visualize how data is organized and transmitted across their companyโ€™s network. The analyst inspects the transmission of data packets, such as the switches that direct data to its destination. Which layer are they investigating?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 16)
A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?

  • IPv4
  • IPv6
  • MAC
  • Ethernet

Question 17)
Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an accurate ___ address.

  • Ethernet
  • IPv4
  • MAC
  • IPv6

Question 18)
What is the term for a group of connected devices?

  • Protocol
  • Hub
  • Cloud
  • Network

Question 19)
Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.

  • CSPs provide business analytics to monitor web traffic and sales.
  • CSP remote servers allow online services to be accessed from any location.
  • CSPs offer on-demand storage.
  • CSP data and devices are more secure because they are stored locally.

Question 20)
What is the purpose of the protocol number of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To signal to the receiving device that the packet is finished
  • To contain the IP and MAC addresses
  • To tell the receiving device what to do with the information in the packet

Question 21)
Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.

  • LAN
  • Modem
  • Cloud
  • WAN

Question 22)
Which of the following statements accurately describe switches? Select all that apply.

  • Switches are less secure than hubs.
  • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
  • Some benefits to switches are effective control of traffic flow and improved network performance.
  • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.

Question 23)
What information is included in the body of a data packet?

  • The signal that tells the receiving device that the packet is finished transferring
  • The message to be transmitted to the receiving device
  • The protocol number
  • The MAC address

Question 24)
Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.

  • Cloud computing
  • Software defined networks (SDNs)
  • Hybrid cloud environment
  • Local area network (LAN)

Question 25)
What port number is used for large file transfers?

  • 25
  • 20
  • 37
  • 443

Question 26)
Fill in the blank: 127.0.0.1 is an example of an ___ address.

  • MAC
  • IPv6
  • Ethernet
  • IPv4

Question 27)
Which network device connects multiple networks together?

  • A router
  • A switch
  • A hub
  • A modem

Question 28)
Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 29)
A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?

  • IPv4
  • Ethernet
  • MAC
  • IPv6

Question 4)
A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.

  • CSP remote servers allow web applications to be accessed from any location.
  • A CSP offers processing power that is only paid for as needed.
  • CSP services may be accessed even when a business is not connected to the internet.
  • A CSP provides business analytics to monitor web traffic and sales.