All Coursera Quiz Answers

Connect and Protect: Networks and Network Security Weekly challenge 3 Quiz Answers

In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security Weekly challenge 3 Quiz Answers with you..

Enroll Link: Connect and Protect: Networks and Network Security


Also Visit:  Connect and Protect: Networks and Network Security Weekly challenge 2 Quiz Answers


 

Connect and Protect: Networks and Network Security Weekly challenge 3 Quiz Answers

Question 1)
What is the main objective of a Denial of Service (DoS) attack?

  • Repeatedly send ICMP packets to a network server
  • Send oversized ICMP packets
  • Simulate a TCP connection and flood a server with SYN packets
  • Disrupt normal business operations

Question 2)
Which type of attack overloads a network with traffic and overwhelms the target server?

  • Denial of Service (DoS)
  • Ping of death
  • SYN flood
  • IP spoofing

Question 3)
A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?

  • The port numbers in the data packets are incorrect.
  • A large number of ICMP packets are delivered to the organization’s servers.
  • An oversized ICMP packet is sent to the network server.
  • The server has stopped responding after receiving an unusually high number of incoming SYN packets.

Question 4)
Which type of attack occurs when a malicious actor sends an oversized ICMP packet to a server?

  • on-path
  • Ping of Death
  • smurf
  • SYN flood

Question 5)
Which type of packet sniffing allows malicious actors to view and read data packets in transit?

  • Passive packet sniffing
  • Active packet sniffing
  • IP packet interception
  • Hardware packet sniffing

Question 6)
A malicious actor changes to the source IP of a data packet in order to communicate over an organization’s internal network. Which type of attack is this?

  • IP spoofing
  • Passive packet sniffing
  • Ping of Death
  • Active packet sniffing

Question 7)
What are some common IP spoofing attacks? Select all that apply.

  • on-path attacks
  • replay attacks
  • smurf attacks
  • KRACK attacks

Question 8)
A malicious actor impersonates a web browser or web server by placing themselves between two devices, then sniffing the packet information to discover the IP and MAC addresses. Which type of attack is this?

  • Malware attack
  • On-path attack
  • Smurf attack
  • Packet flooding attack

Question 9)
Fill in the blank: The _____ network attack occurs when an attacker intercepts a data packet in transit, then repeats it at another time.

  • replay
  • on-path
  • SYN flood
  • smurf

Question 10)
Which attack involves an attacker sniffing an authorized user’s IP address and flooding it with packets?

  • Ping of Death
  • Smurf attack
  • Replay attack
  • On-path attack

Question 11)
A security team investigates a server that has been overwhelmed with SYN packets. What does this scenario describe?

  • Ping of Death
  • On-path attack
  • ICMP flood attack
  • SYN flood attack

Question 12)
Which of the following statements correctly describe passive and active packet sniffing? Select three answers.

  • Passive packet sniffing may enable attackers to change the information a packet contains.
  • The purpose of passive packet sniffing is to read data packets while in transit.
  • Using only websites with HTTPS at the beginning of their domain names provides protection from packet sniffing.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.

Question 13)
As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?

  • Ping of death
  • Packet sniffing
  • SYN flooding
  • IP spoofing

Question 14)
In which attack would malicious actors gain access to a network, put themselves between a web browser and a web server, then sniff the packet to learn the devices’ IP and MAC addresses?

  • On-path attack
  • Malware attack
  • Smurf attack
  • Packet flooding attack

Question 15)
What type of attack occurs when an attacker intercepts a data packet in transit and delays it or repeats it at another time?

  • SYN flood
  • smurf
  • on-path
  • replay

Question 16)
Fill in the blank: A ___ attack happens when a malicious actor sniffs an authorized user’s IP address and floods it with packets.

  • Replay attack
  • On-path attack
  • Ping of Death
  • Smurf attack

Question 17)
What do network-level Denial of Service (DoS) attacks target?

  • All hardware within an organization
  • Commonly used software applications
  • The personal information of employees
  • Network bandwidth

Question 18)
Fill in the blank: A _____ attack uses multiple devices in different locations to flood the target network with unwanted traffic.

  • Distributed Denial of Service (DDoS)
  • Tailgating
  • Ping of death
  • ICMP flood

Question 19)
A security team discovers that an attacker has taken advantage of the handshake process that is used to establish a TCP connection between a device and their server. Which DoS attack does this scenario describe?

  • ICMP flood
  • Ping of Death
  • On-path attack
  • SYN flood attack

Question 20)
Fill in the blank: Security analysts use ____ to analyze and capture packets when investigating ongoing incidents or debugging network issues.

  • Packet sniffing
  • SIEM
  • Passive packet sniffing
  • Active packet sniffing

Question 21)
Fill in the blank: To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.

  • demilitarized zone
  • firewall
  • VPN
  • HTTPS domain address

Question 22)
Fill in the blank: In a/an ____ attack, a malicious actor places themselves in the middle of an authorized connection and intercepts the data in transit.

  • Smurf attack
  • Packet flooding attack
  • Malware attack
  • On-path attack

Question 23)
A malicious actor intercepts a network transmission that was sent by an authorized user and repeats it at a later time to impersonate a user. Which type of attack is this?

  • on-path
  • smurf
  • replay
  • SYN flood

Question 24)
What happens during a Denial of Service (DoS) attack?

  • The data packets containing valuable information are stolen as they travel across the network.
  • The target crashes and normal business operations cannot continue.
  • The network is infected with malware.
  • The attacker successfully impersonates an authorized user and gains access to the network.

Question 25)
Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.

  • In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
  • A DoS attack involves one host conducting the attack.
  • A DDoS attack involves multiple hosts carrying out the attack.
  • A network device experiencing a DoS attack is unable to respond to legitimate users.

Question 26)
Fill in the blank: The maximum size of a correctly formatted IPv4 ICMP packet is _____, as opposed to the oversized packet that is sent during a Ping of Death attack.

  • 64KB
  • 15Gb
  • 64TB
  • 32KB

Question 27)
Fill in the blank: In a _____ attack, an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.

  • Ping of Death
  • Passive packet sniffing
  • Active packet sniffing
  • IP spoofing

Question 28)
Fill in the blank: _____ is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.

  • IP spoofing
  • A KRACK attack
  • A DoS attack
  • SYN flooding

Question 29)
A malicious actor repeatedly sends ICMP packets to a network server. What kind of DoS attack is this?

  • smurf
  • on-path
  • SYN flood
  • ICMP flood

Question 30)
A malicious actor takes down a network by flooding an authorized user’s IP address with packets. Which type of DDoS attack is this?

  • Replay attack
  • Ping of Death
  • On-path attack
  • Smurf attack