Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers
In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers with you..
Enroll Link: Connect and Protect: Networks and Network Security
Also Visit: Connect and Protect: Networks and Network Security Weekly challenge 1 Quiz Answers
Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers
Question 1)
What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?
- Address Resolution Protocol (ARP)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Transmission Control Protocol (TCP)
- Hypertext Transfer Protocol Secure (HTTPS)
Question 2)
What set of standards is known as Wi-Fi?
- IEEE 802.11
- WPA
- 802.11
- WEP
Question 3)
Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops them from entering the network?
- Next-generation firewall (NGFW)
- Stateless
- Cloud-based
- Stateful
Question 4)
Which of the following types of firewalls can perform deep packet inspection and intrusion detection?
- Next generation firewall (NGFW)
- Stateless firewall
- Documented firewall
- Stateful firewall
Question 5)
What network security service masks a device’s virtual location to keep data private while using a public network?
- Network segmenter
- Cloud service provider (CSP)
- Virtual private network (VPN)
- Domain name system (DNS)
Question 6)
Which of the following does encapsulation protect?
- public IP addresses
- proxy servers
- data in transit
- cryptographic keys
Question 7)
What network is part of the uncontrolled zone?
- Internal networks
- Web servers
- Subnets
- Internet
Question 8)
What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?
- Uncontrolled zone
- Demilitarized zone
- Restricted zone
- Virtual private network
Question 9)
A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.
- Use public IP addresses that are different from the rest on the private network
- Determine whether requests to connect to a website are allowed
- Temporarily stores data that is frequently requested by external servers
- Divide the network into segments to maintain privacy within corporate groups
Question 10)
How do forward proxy servers secure internal networks?
- They are useful for protecting internal web servers that contain confidential data.
- They hide a user’s IP address and approve all outgoing requests.
- Both forward and reverse proxy servers add a layer of protection from the internet.
- They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
Question 1)
What internet communication protocol allows two devices to form a connection and stream data?
- Address Resolution Protocol (ARP)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Transmission Control Protocol (TCP)
- Hypertext Transfer Protocol Secure (HTTPS)
Question 3)
A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?
- Organizing data packets
- Location masking
- Using cloud-based firewalls
- Port filtering
Question 5)
How do VPNs preserve confidentiality?
- Translate internet domain names to IP addresses
- Use temporary memory to store data requested by external servers
- Monitor traffic to and from a network
- Encrypt data in transit
Question 6)
What does a VPN service use to transfer encrypted data between a device and the VPN server?
- encapsulation
- transmission control
- packet sniffing
- network segmentation
Question 7)
What network zone contains the internet and other services that are outside of an organization’s control?
- Controlled
- Uncontrolled
- Demilitarized
- Restricted
Question 8)
What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?
Virtual private network- Demilitarized zone
- Restricted zone
- Uncontrolled zone
Question 10)
Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.
- next generation firewall (NGFW)
- forward proxy server
- virtual private network (VPN)
- reverse proxy server
Question 2)
Fill in the blank: The _______ maintains Wi-Fi standards.
- IEEE 802.11
- Transmission control protocol (TCP)
- Domain name system (DNS)
- WiFi protected access (WPA)
Question 4)
Fill in the blank: A ____ firewall can connect to cloud-based threat intelligence services and quickly update against emerging cyber threats
- next generation firewall (NGFW)
- stateless
- documented
- stateful
Question 6)
Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.
packet sniffing- transmission control
- encapsulation
network segmentation
Question 2)
Which of the following statements accurately describe wireless protocols? Select three answers.
- WPA is a wireless security protocol pertaining to connecting to the internet.
- Wi-Fi protocols provide significantly lower security levels than wired connections.
- The set of standards IEEE 802.11 is also referred to as Wi-Fi.
- The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
Question 3)
Fill in the blank: A ____ firewall operates based on predefined rules. It is not used to keep track of information from data packets.
- cloud-based
- next-generation firewall (NGFW)
- stateful
- stateless
Question 8)
What is the function of the demilitarized zone (DMZ)?
- Isolate servers exposed to the internet from the rest of a network
- Organize data by forwarding it to other servers
- Protect highly confidential information accessible only to employees with certain privileges
- Encrypt data as it travels across the internet
Question 9)
Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers
- firewall
- virtual private network (VPN)
- proxy server
- router
Question 1)
What network protocol translates the domain name of a website’s server into an IP address?
- Hypertext transfer protocol secure (HTTPS)
- Transmission control protocol (TCP)
- Domain name system (DNS)
- File transfer protocol (FTP)
Question 7)
Fill in the blank. A controlled zone protects a company’s internal network from a(n)___ security zone.
- uncontrolled
- internal network
- demilitarized
- restricted
Question 10)
Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
- Forward proxy servers regulate and restrict a person’s access to the internet.
- Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
Question 4)
Which firewall offers the most security features?
- Next generation firewall (NGFW)
- Stateless firewall
- Stateful firewall
- Documented firewall
Question 5)
A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?
- Virtual private network (VPN)
- Address resolution protocol (ARP)
- Cloud service provider (CSP)
- Firewall
Which of the following services client requests by forwarding them to other servers?
*** Proxy server
Firewall
Virtual private network (VPN)
Router