All Coursera Quiz Answers

Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers

In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security | Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers with you..

Enroll Link: Connect and Protect: Networks and Network Security


Also Visit:  Connect and Protect: Networks and Network Security Weekly challenge 4 Quiz Answers


 

Weekly challenge 1 Quiz Answers

Question 1)
What type of network spans an office building, a school, or a home?

  • WAN
  • Modem
  • LAN
  • Cloud

Question 2)
A _____ broadcasts information to every device on the network.

  • hub
  • router
  • switch
  • modem

Question 3)
Which network device makes connections between specific devices on a network by sending and receiving data between them?

  • A switch
  • A router
  • A hub
  • A modem

Question 4)
What are some of the benefits cloud service providers (CSPs) offer security professionals? Select all that apply.

  • CSP servers, applications, and network services are hosted on local physical devices.
  • CSPs offer online services and web applications that can be accessed from any location.
  • CSPs can save an organization money by offering processing power that is only paid for as needed.
  • CSPs provide business analytics to monitor web traffic and sales.

Question 5)
What is the purpose of the footer of a data packet?

  • To contain the source IP address
  • To signal to the receiving device that the packet is finished
  • To identify the message to be transmitted to the receiving device
  • To show the MAC address of the destination device

Question 6)
What are the three main categories of services that CSPs provide? Select all that apply.

  • Platform as a service (PaaS)
  • Software as a service (SaaS)
  • Desktop as a service (DaaS)
  • Infrastructure as a service (IaaS)

Question 7)
Which one of the following port numbers is used for email traffic?

  • 20
  • 443
  • 23
  • 25

Question 8)
Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 9)
Which of the following addresses is an accurate IPv4 address?

  • 1001.2345.3234.5678
  • 129.168.10.25678.1
  • 192.168.0.2
  • 100.234.56.1.3

Question 10)
Which of the following addresses is an accurate IPv6 address?

  • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
  • fda2::7361:135b::38f5:c8bd:1b3e:2578
  • a360::abf7:h234:0011:g126:1130::ffj2
  • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff

Question 11)
Fill in the blank: A computer sends information to the router and the router then transfers information through a ____ to the internet.

  • hub
  • LAN
  • modem
  • switch

Question 12)
Fill in the blank: A ___ is a device that makes connections between specific devices on a network by sending and receiving data between them.

  • switch
  • hub
  • modem
  • router

Question 13)
What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.

  • Increased scalability
  • Decreased cost
  • Increased attack surface
  • Decreased reliability

Question 14)
A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?

  • 40
  • 443
  • 25
  • 20

Question 15)
A security analyst uses the TCP/IP model to visualize how data is organized and transmitted across their company’s network. The analyst inspects the transmission of data packets, such as the switches that direct data to its destination. Which layer are they investigating?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 16)
A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?

  • IPv4
  • IPv6
  • MAC
  • Ethernet

Question 17)
Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an accurate ___ address.

  • Ethernet
  • IPv4
  • MAC
  • IPv6

Question 18)
What is the term for a group of connected devices?

  • Protocol
  • Hub
  • Cloud
  • Network

Question 19)
Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.

  • CSPs provide business analytics to monitor web traffic and sales.
  • CSP remote servers allow online services to be accessed from any location.
  • CSPs offer on-demand storage.
  • CSP data and devices are more secure because they are stored locally.

Question 20)
What is the purpose of the protocol number of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To signal to the receiving device that the packet is finished
  • To contain the IP and MAC addresses
  • To tell the receiving device what to do with the information in the packet

Question 21)
Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.

  • LAN
  • Modem
  • Cloud
  • WAN

Question 22)
Which of the following statements accurately describe switches? Select all that apply.

  • Switches are less secure than hubs.
  • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
  • Some benefits to switches are effective control of traffic flow and improved network performance.
  • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.

Question 23)
What information is included in the body of a data packet?

  • The signal that tells the receiving device that the packet is finished transferring
  • The message to be transmitted to the receiving device
  • The protocol number
  • The MAC address

Question 24)
Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.

  • Cloud computing
  • Software defined networks (SDNs)
  • Hybrid cloud environment
  • Local area network (LAN)

Question 25)
What port number is used for large file transfers?

  • 25
  • 20
  • 37
  • 443

Question 26)
Fill in the blank: 127.0.0.1 is an example of an ___ address.

  • MAC
  • IPv6
  • Ethernet
  • IPv4

Question 27)
Which network device connects multiple networks together?

  • A router
  • A switch
  • A hub
  • A modem

Question 28)
Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

Question 29)
A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?

  • IPv4
  • Ethernet
  • MAC
  • IPv6

Question 4)
A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.

  • CSP remote servers allow web applications to be accessed from any location.
  • A CSP offers processing power that is only paid for as needed.
  • CSP services may be accessed even when a business is not connected to the internet.
  • A CSP provides business analytics to monitor web traffic and sales.