Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 5 | Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers with you.
Enrol Link: Cybersecurity Architecture
Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers
Question 1)
What is the primary issue with Jackson Corporation’s current firewall setup?
- The firewall does not filter any traffic.
- The firewall indiscriminately filters both external and internal traffic.
- The firewall only filters internal traffic.
- The firewall only filters external traffic.
Question 2)
The indiscriminate filtering of the firewall does not allow for specialized security protocols based on the traffic’s origin, which creates a potential risk. Which solution would best address the security gap in the existing firewall structure?
- Enhancing the current firewall with additional software
- Introducing a dual firewall structure
- Removing the current firewall
- Replacing the current firewall with a stronger one
Question 3)
Why is the current setup of Jackson Corporation’s web server considered vulnerable? (Select two)
- Because the server is protected by multiple firewalls
- Because the server is located inside the organization’s primary network.
- Because the server is located outside the organization’s primary network.
- Because the server is protected only by a basic firewall
Question 4)
What is the primary benefit of implementing a DMZ in the context of Jackson Corporation’s web server?
- It will help isolate the web server from the rest of the internal network, enhancing security.
- It will allow more users to access the web server simultaneously.
- It will make the server faster.
- It will reduce the cost of maintaining the web server.
Question 5)
What is currently missing from Jackson Corporation’s network infrastructure?
- Wireless networks
- A comprehensive system for centrally monitoring, logging, and analyzing security events
- Operational efficiency
- Interconnectivity of devices
Question 6)
What is the primary benefit of implementing a Security Information and Event Management (SIEM) system at Jackson Corporation?
- It reduces operational efficiency.
- It provides a centralized view of network security.
- It allows devices to be interconnected.
- It reduces the speed of detecting threats.
Question 7)
What is the primary limitation of the current network monitoring system at Jackson Corporation?
- Inability to provide real-time alerts on security threats
- Inability to check the network’s health
- Inability to monitor traffic volume
- Inability to identify issues related to server downtime
Question 8)
How does an Intrusion Detection System (IDS) enhance Jackson Corporation’s network security approach?
- By providing only basic network performance metrics
- By limiting the amount of network traffic
- By reducing server downtime occurrences
- By monitoring the network for possible incidents and logging information about them
Question 9)
Why is a Virtual Private Network (VPN) necessary for Jackson Corporation?
- To provide additional storage space on the cloud
- To provide free Internet access
- To increase the speed of internet connection
- To provide secure remote access to the company’s network
Question 10)
What risks are associated with accessing company resources over public or unsecured networks?
- The Internet speed can be slow.
- The company’s website might crash.
- There might be open access to the Internet.
- Data can be intercepted and compromised.
Question 11)
What is a significant drawback of the traditional waterfall approach to software development currently followed by Jackson Corporation? (Select two)
- Chatbots focus on security in code.
- The process is not adaptable to changes.
- Developers focus on functionality over security.
- The process does not allow for regular code reviews
Question 12)
What is one significant benefit of adopting secure coding practices at Jackson Corporation?
- It will eliminate the need for code reviews.
- It will reduce the cost of software development.
- It will integrate security considerations into every stage of the software development process.
- It will make the software development process faster.