Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 3 | Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers with you.
Enrol Link: Cybersecurity Architecture
Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers
Question 1)
What does the term ‘micro-segmentation’ refer to?
- Dividing the network into macro and micro pieces
- Creating large zones within your network
- Dividing the network into two large segments
- Creating numerous small zones within your network
Question 2)
What is the primary function of a firewall in network security?
- To provide a physical barrier to protect the network
- To divide the network into smaller parts
- To increase the speed of data transfer on the network
- To monitor and control incoming and outgoing network traffic
Question 3)
What is SASE meant to deliver?
- Network capabilities from the edge of the network
- Security capabilities from the edge of the network
- Cloud capabilities from the edge of the network
- Security and network capabilities from the cloud at the network’s edge
Question 4)
What is “white box” testing in the context of application security?
- Testing the application without knowing the source code
- Testing the application in a white room
- Testing the application with a white-colored interface
- Testing the application knowing the source code
Question 5)
What does the term “shift left” in the dev process imply?
- Shifting to a different programming language
- Incorporating security checks at earlier stages in the development cycle
- Moving the development process to the left side of the office
- Shifting the development process to less experienced developers
Question 6)
Why is it recommended to use both source code and dynamic scanners in application security?
- Because one is cheaper than the other
- Because one works faster than the other
- Because they find different types of vulnerabilities
- Because they both find the same types of vulnerabilities
Question 7)
What is the potential downside of using chatbots for code generation?
- They require a constant internet connection
- They can introduce vulnerabilities in the code
- They write code in an outdated programming language
- They take a long time to generate code
Question 8)
What is the ultimate thing that needs to be protected in most cases of data security?
- The data itself
- The source code
- The servers where the data is stored
- The firewalls and security systems
Question 9)
Why is leveraging learning from sources like OWASP in application security important?
- To keep making the same mistakes over and over
- To connect with other security professionals
- To learn about the latest trends in application security
- To not keep making the same mistakes over and over
Question 10)
What is the role of user behavior analytics in data security?
- To reward users for good behavior
- To provide team-building opportunities for the security team
- To detect misuse and abuse of data
- To ignore anomalous behavior