All Coursera Quiz Answers

Connect and Protect: Networks and Network Security Weekly challenge 4 Quiz Answers

In this article i am gone to share Coursera Course: Connect and Protect: Networks and Network Security | Connect and Protect: Networks and Network Security Weekly challenge 4 Quiz Answers with you..

Enroll Link: Connect and Protect: Networks and Network Security


Also Visit:ย  Connect and Protect: Networks and Network Security Weekly challenge 3 Quiz Answers


 

Connect and Protect: Networks and Network Security Weekly challenge 4 Quiz Answers

Question 1)
Fill in the blank: ____ is the process of strengthening a system to reduce its vulnerability and attack surface.

  • Security hardening
  • Network hardening
  • Port filtering
  • SIEM

Question 2)
What is the relationship between security hardening and an attack surface?

  • Security hardening increases the attack surface.
  • Security hardening diminishes the attack surface.
  • Security hardening permanently eliminates the attack surface.
  • Security hardening expands the attack surface.

Question 3)
Fill in the blank: Requiring employees to turn off their personal devices while in secure areas is an example of a _____ security hardening practice.

  • cloud-based
  • network-focused
  • virtual
  • physical

Question 4)
A companyโ€™s executive team approves a proposal by the security director. The proposal involves security professionals simulating an attack on the companyโ€™s systems in order to identify vulnerabilities. What does this scenario describe?

  • A Distributed Denial of Service (DDoS) attack
  • Packet sniffing
  • Penetration testing
  • The Ping of Death

Question 5)
What are some methods for hardening operating systems? Select three answers.

  • Configuring a device setting to fit a secure encryption standard
  • Removing unused software to limit unnecessary vulnerabilities
  • Keeping an up-to-date list of authorized users.
  • Implementing an intrusion detection system (IDS)

Question 6)
Fill in the blank: A/An _____ is a documented set of specifications within a system that is used as a basis for future builds, releases, and updates

  • baseline configuration
  • internet control message protocol update
  • virtual private network installation
  • network segment

Question 7)
Which OS hardening practice requires users to verify their identity in two or more ways to access a system or network?

  • Multi-factor authentication (MFA)
  • Patch updates
  • SIEM
  • Port filtering

Question 8)
Which of the following statements accurately describes port filtering?

  • A firewall function that blocks or allows certain port numbers in order to limit unwanted network traffic
  • A security technique that divides a network into segments
  • A process performed by a VPN service that protects data by wrapping it in other data packets
  • A security protocol that provides an encrypted tunnel for issuing commands from a remote server

Question 9)
Which network hardening practice is used to create isolated subnets for different departments in an organization?

  • Network segmentation
  • Penetration testing
  • Patch updating
  • Cloud hardening

Question 10)
How can a security professional confirm that no unverified changes have occurred within a cloud server?

  • Perform a penetration test
  • Establish multifactor authentication (MFA)
  • Compare the server baseline image to the data in cloud servers
  • Use port filtering to block or allow certain updates

 

Question 11)
When performing security hardening, what is the goal with regards to the attack surface?

  • Hide the attack surface
  • Augment the attack surface
  • Reduce the attack surface
  • Mirror the attack surface

Question 12)
Fill in the blank: Installing security cameras is an example of a _____ security hardening practice.

  • physical
  • virtual
  • software-based
  • network-focused

Question 13)
An organizationโ€™s in-house security team has been authorized to simulate an attack on the organizationโ€™s website. The objective is to identify any vulnerabilities that are present. What does this scenario describe?

  • Packet sniffing
  • The Ping of Death
  • A Distributed Denial of Service (DDoS) attack
  • Penetration testing

 

Question 14)
A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current firewall to ensure no changes have been made. What does this scenario describe?

  • Verifying user identity when accessing an OS
  • Checking baseline configuration
  • Responsibly managing applications
  • Upgrading the interface between computer hardware and the user

Question 15)
Fill in the blank: The security measure _____ requires a user to verify their identity in two or more ways to access a system or network.

  • multifactor authentication (MFA)
  • baseline configuration
  • network log analysis
  • password policy

Question 16)
In what way might port filtering be used to protect a network from an attack?

  • To disable unused ports in order to reduce the attack surface
  • To inspect, analyze, and react to security events based on their priority
  • To increase the attack surface in a network
  • To create isolated subnets for different departments in an organization

Question 17)
What is one key similarity between regular web servers and cloud servers?

  • In both, all applications are stored together, regardless of their age.
  • They both require proper maintenance and security hardening.
  • In both, all data and application are stored together, regardless of their service category.
  • They both use baseline images stored in the cloud to compare data.

 

Question 18)
Updating software, performing port filtering, and keeping network devices functioning properly are all examples of what type of hardening?

  • Security hardening
  • OS hardening
  • Network hardening
  • Attack surface

Question 19)
Fill in the blank: Hiring a security guard is an example of a _____ security hardening practice.

  • virtual
  • physical
  • software-based
  • network-focused

Question 20)
Which of the following are OS hardening tasks? Select three answers.

  • Conducting a penetration test
  • Regularly installing updates
  • Implementing multifactor authentication
  • Using secure encryption standards

Question 21)
In what way might port filtering be used to protect a network from an attack?

  • By increasing the attack surface within a business network
  • By blocking or allowing certain port numbers in order to limit unwanted communication
  • By creating isolated subnets for each of the various departments within an organization
  • By helping analysts inspect, analyze, and react to security events based on their priority

Question 22)
Fill in the blank: A ____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

  • patch update
  • baseline configuration
  • cloud network
  • SIEM

Question 23)
What are the purposes of performing a patch update for security hardening? Select all that apply.

  • Upgrading an operating system to the latest software version.
  • Fixing known security vulnerabilities in a network or services.
  • Preventing malicious actors from flooding a network.
  • Requiring a user to verify their identity to access a system or network.

Question 24)
To help improve the security of a business, its in-house security team is approved to simulate an attack that will identify vulnerabilities in business processes. What does this scenario describe?

  • Packet sniffing
  • Penetration testing
  • A Distributed Denial of Service (DDoS) attack
  • The Ping of Death

Question 25)
Fill in the blank: Security analysts use ____ to create isolated subnets for different departments in an organization.

  • network segmentation
  • penetration testing
  • patch updating
  • cloud hardening

Question 26)
What is the term for all the potential system vulnerabilities that a threat actor could exploit?

  • Attack surface
  • Risk
  • Security challenge
  • Security architecture

Question 27)
A security team considers the best way to handle the different security zones within their network. They prioritize protecting the restricted zone by separating from the rest of the network and ensuring it has much higher encryption standards. What does this scenario describe?

  • Penetration testing
  • Cloud hardening
  • Network segmentation
  • Patch updating

Question 28)
Multi-factor authentication (MFA) is an example of which type of hardening practice?

  • Network hardening
  • Attack surface
  • OS hardening
  • Network log analysis

Question 29)
Which of the following statements accurately describe OS hardening tasks? Select three answers.

  • OS hardening is a set of procedures that maintain and improve OS security.
  • When disposing of software, it is a best practice to delete any unused applications.
  • Multi-factor authentication is a security measure requiring users to change passwords every month.
  • Some OS hardening tasks are performed at regular intervals, while others are performed only once.

Question 6)
Which OS hardening practice involves a security analyst comparing the current configuration to existing documentation about the OS?

  • Verifying user identity when accessing an OS
  • Conducting a network log analysis
  • Checking baseline configuration
  • Performing port filtering over network ports