All Coursera Quiz Answers

Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 5 | Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers with you.

Enrol Link:  Cybersecurity Architecture

 

Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers

Question 1)
What is the primary issue with Jackson Corporation’s current firewall setup?

  • The firewall does not filter any traffic.
  • The firewall indiscriminately filters both external and internal traffic.
  • The firewall only filters internal traffic.
  • The firewall only filters external traffic.

Question 2)
The indiscriminate filtering of the firewall does not allow for specialized security protocols based on the traffic’s origin, which creates a potential risk. Which solution would best address the security gap in the existing firewall structure?

  • Enhancing the current firewall with additional software
  • Introducing a dual firewall structure
  • Removing the current firewall
  • Replacing the current firewall with a stronger one

Question 3)
Why is the current setup of Jackson Corporation’s web server considered vulnerable? (Select two)

  • Because the server is protected by multiple firewalls
  • Because the server is located inside the organization’s primary network.
  • Because the server is located outside the organization’s primary network.
  • Because the server is protected only by a basic firewall

Question 4)
What is the primary benefit of implementing a DMZ in the context of Jackson Corporation’s web server?

  • It will help isolate the web server from the rest of the internal network, enhancing security.
  • It will allow more users to access the web server simultaneously.
  • It will make the server faster.
  • It will reduce the cost of maintaining the web server.

Question 5)
What is currently missing from Jackson Corporation’s network infrastructure?

  • Wireless networks
  • A comprehensive system for centrally monitoring, logging, and analyzing security events
  • Operational efficiency
  • Interconnectivity of devices

Question 6)
What is the primary benefit of implementing a Security Information and Event Management (SIEM) system at Jackson Corporation?

  • It reduces operational efficiency.
  • It provides a centralized view of network security.
  • It allows devices to be interconnected.
  • It reduces the speed of detecting threats.

Question 7)
What is the primary limitation of the current network monitoring system at Jackson Corporation?

  • Inability to provide real-time alerts on security threats
  • Inability to check the network’s health
  • Inability to monitor traffic volume
  • Inability to identify issues related to server downtime

Question 8)
How does an Intrusion Detection System (IDS) enhance Jackson Corporation’s network security approach?

  • By providing only basic network performance metrics
  • By limiting the amount of network traffic
  • By reducing server downtime occurrences
  • By monitoring the network for possible incidents and logging information about them

Question 9)
Why is a Virtual Private Network (VPN) necessary for Jackson Corporation?

  • To provide additional storage space on the cloud
  • To provide free Internet access
  • To increase the speed of internet connection
  • To provide secure remote access to the company’s network

Question 10)
What risks are associated with accessing company resources over public or unsecured networks?

  • The Internet speed can be slow.
  • The company’s website might crash.
  • There might be open access to the Internet.
  • Data can be intercepted and compromised.

Question 11)
What is a significant drawback of the traditional waterfall approach to software development currently followed by Jackson Corporation? (Select two)

  • Chatbots focus on security in code.
  • The process is not adaptable to changes.
  • Developers focus on functionality over security.
  • The process does not allow for regular code reviews

Question 12)
What is one significant benefit of adopting secure coding practices at Jackson Corporation?

  • It will eliminate the need for code reviews.
  • It will reduce the cost of software development.
  • It will integrate security considerations into every stage of the software development process.
  • It will make the software development process faster.