All Coursera Quiz Answers

Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers

In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers with you..

Enroll Link: Connect and Protect: Networks and Network Security


Also Visit:  Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers


 

Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers

Question 1)
What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?

  • Address Resolution Protocol (ARP)
  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
  • Transmission Control Protocol (TCP)
  • Hypertext Transfer Protocol Secure (HTTPS)

Question 2)
What set of standards is known as Wi-Fi?

  • IEEE 802.11
  • WPA
  • 802.11
  • WEP

Question 3)
Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops them from entering the network?

  • Next-generation firewall (NGFW)
  • Stateless
  • Cloud-based
  • Stateful

Question 4)
Which of the following types of firewalls can perform deep packet inspection and intrusion detection?

  • Next generation firewall (NGFW)
  • Stateless firewall
  • Documented firewall
  • Stateful firewall

Question 5)
What network security service masks a device’s virtual location to keep data private while using a public network?

  • Network segmenter
  • Cloud service provider (CSP)
  • Virtual private network (VPN)
  • Domain name system (DNS)

Question 6)
Which of the following does encapsulation protect?

  • public IP addresses
  • proxy servers
  • data in transit
  • cryptographic keys

Question 7)
What network is part of the uncontrolled zone?

  • Internal networks
  • Web servers
  • Subnets
  • Internet

Question 8)
What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?

  • Uncontrolled zone
  • Demilitarized zone
  • Restricted zone
  • Virtual private network

Question 9)
A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.

  • Use public IP addresses that are different from the rest on the private network
  • Determine whether requests to connect to a website are allowed
  • Temporarily stores data that is frequently requested by external servers
  • Divide the network into segments to maintain privacy within corporate groups

Question 10)
How do forward proxy servers secure internal networks?

  • They are useful for protecting internal web servers that contain confidential data.
  • They hide a user’s IP address and approve all outgoing requests.
  • Both forward and reverse proxy servers add a layer of protection from the internet.
  • They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.

Question 1)
What internet communication protocol allows two devices to form a connection and stream data?

  • Address Resolution Protocol (ARP)
  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
  • Transmission Control Protocol (TCP)
  • Hypertext Transfer Protocol Secure (HTTPS)

Question 3)
A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?

  • Organizing data packets
  • Location masking
  • Using cloud-based firewalls
  • Port filtering

Question 5)
How do VPNs preserve confidentiality?

  • Translate internet domain names to IP addresses
  • Use temporary memory to store data requested by external servers
  • Monitor traffic to and from a network
  • Encrypt data in transit

Question 6)
What does a VPN service use to transfer encrypted data between a device and the VPN server?

  • encapsulation
  • transmission control
  • packet sniffing
  • network segmentation

Question 7)
What network zone contains the internet and other services that are outside of an organization’s control?

  • Controlled
  • Uncontrolled
  • Demilitarized
  • Restricted

Question 8)
What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?

  • Virtual private network
  • Demilitarized zone
  • Restricted zone
  • Uncontrolled zone

Question 10)
Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.

  • next generation firewall (NGFW)
  • forward proxy server
  • virtual private network (VPN)
  • reverse proxy server

Question 2)
Fill in the blank: The _______ maintains Wi-Fi standards.

  • IEEE 802.11
  • Transmission control protocol (TCP)
  • Domain name system (DNS)
  • WiFi protected access (WPA)

Question 4)
Fill in the blank: A ____ firewall can connect to cloud-based threat intelligence services and quickly update against emerging cyber threats

  • next generation firewall (NGFW)
  • stateless
  • documented
  • stateful

Question 6)
Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.

  • packet sniffing
  • transmission control
  • encapsulation
  • network segmentation

Question 2)
Which of the following statements accurately describe wireless protocols? Select three answers.

  • WPA is a wireless security protocol pertaining to connecting to the internet.
  • Wi-Fi protocols provide significantly lower security levels than wired connections.
  • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
  • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.

Question 3)
Fill in the blank: A ____ firewall operates based on predefined rules. It is not used to keep track of information from data packets.

  • cloud-based
  • next-generation firewall (NGFW)
  • stateful
  • stateless

Question 8)
What is the function of the demilitarized zone (DMZ)?

  • Isolate servers exposed to the internet from the rest of a network
  • Organize data by forwarding it to other servers
  • Protect highly confidential information accessible only to employees with certain privileges
  • Encrypt data as it travels across the internet

Question 9)
Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers

  • firewall
  • virtual private network (VPN)
  • proxy server
  • router

Question 1)
What network protocol translates the domain name of a website’s server into an IP address?

  • Hypertext transfer protocol secure (HTTPS)
  • Transmission control protocol (TCP)
  • Domain name system (DNS)
  • File transfer protocol (FTP)

Question 7)
Fill in the blank. A controlled zone protects a company’s internal network from a(n)___ security zone.

  • uncontrolled
  • internal network
  • demilitarized
  • restricted

Question 10)
Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.

  • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
  • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
  • Forward proxy servers regulate and restrict a person’s access to the internet.
  • Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.

Question 4)
Which firewall offers the most security features?

  • Next generation firewall (NGFW)
  • Stateless firewall
  • Stateful firewall
  • Documented firewall

Question 5)
A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?

  • Virtual private network (VPN)
  • Address resolution protocol (ARP)
  • Cloud service provider (CSP)
  • Firewall