All Coursera Quiz Answers

Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 3 | Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers with you.

Enrol Link:  Cybersecurity Architecture

 

Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers

Question 1)
What does the term ‘micro-segmentation’ refer to?

  • Dividing the network into macro and micro pieces
  • Creating large zones within your network
  • Dividing the network into two large segments
  • Creating numerous small zones within your network

Question 2)
What is the primary function of a firewall in network security?

  • To provide a physical barrier to protect the network
  • To divide the network into smaller parts
  • To increase the speed of data transfer on the network
  • To monitor and control incoming and outgoing network traffic

Question 3)
What is SASE meant to deliver?

  • Network capabilities from the edge of the network
  • Security capabilities from the edge of the network
  • Cloud capabilities from the edge of the network
  • Security and network capabilities from the cloud at the network’s edge

Question 4)
What is “white box” testing in the context of application security?

  • Testing the application without knowing the source code
  • Testing the application in a white room
  • Testing the application with a white-colored interface
  • Testing the application knowing the source code

Question 5)
What does the term “shift left” in the dev process imply?

  • Shifting to a different programming language
  • Incorporating security checks at earlier stages in the development cycle
  • Moving the development process to the left side of the office
  • Shifting the development process to less experienced developers

Question 6)
Why is it recommended to use both source code and dynamic scanners in application security?

  • Because one is cheaper than the other
  • Because one works faster than the other
  • Because they find different types of vulnerabilities
  • Because they both find the same types of vulnerabilities

Question 7)
What is the potential downside of using chatbots for code generation?

  • They require a constant internet connection
  • They can introduce vulnerabilities in the code
  • They write code in an outdated programming language
  • They take a long time to generate code

Question 8)
What is the ultimate thing that needs to be protected in most cases of data security?

  • The data itself
  • The source code
  • The servers where the data is stored
  • The firewalls and security systems

Question 9)
Why is leveraging learning from sources like OWASP in application security important?

  • To keep making the same mistakes over and over
  • To connect with other security professionals
  • To learn about the latest trends in application security
  • To not keep making the same mistakes over and over

Question 10)
What is the role of user behavior analytics in data security?

  • To reward users for good behavior
  • To provide team-building opportunities for the security team
  • To detect misuse and abuse of data
  • To ignore anomalous behavior