All Coursera Quiz Answers

Module quiz: Network and device-based threats Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Threat Vectors and Mitigation by Microsoft Week 3 | Module quiz: Network and device-based threats Quiz Answers with you..

Enrol Link:  Cybersecurity Threat Vectors and Mitigation

Cybersecurity Threat Vectors and Mitigation by Microsoft Week 3 Quiz Answers


 

Module quiz: Network and device-based threats Quiz Answers

Question 1)
Jamie is a remote worker who often uses a neighboring coffee shop’s free Wi-Fi to send or receive files and communicate with coworkers. One day, Jamie realized some emails had not been sent and did not appear in the sent folder, while coworkers reported receiving odd emails from Jamie. Which of the following attacks could Jamie be a victim of?

  • Man-in-the-middle attack
  • Replay attack
  • Data exfiltration
  • Brute force attack

Question 2)
True or False: A replay attack involves an attacker retransmitting captured data in order to trick a system into granting unauthorized access.

  • True
  • False

Question 3)
When choosing a VPN service, what factors should be considered to ensure it meets your specific needs?

  • The cost, security features, server locations, and privacy policy of the VPN.
  • Only the number of server locations.
  • Just the cost of the service.
  • Only the security features of the VPN.

Question 4)
Which of the following scenarios is most likely to involve an advanced persistent threat (APT) attack?

  • A user’s personal computer is infected with ransomware that locks their files and demands payment.
  • An individual receives a single phishing email trying to scam them into sending money.
  • A major corporation notices suspicious activity over a prolonged period, including unusual network traffic, increased failed login attempts, and modifications to user privileges.
  • A small business’s website is defaced by a hacker.

Question 5)
True or False: Regularly updating the firmware of your IoT devices automatically guarantees that they are fully protected against all possible cybersecurity threats.

  • True
  • False

Question 6)
You’re working as a network security officer in a large organization. The current network infrastructure includes several servers, hundreds of office computers, an array of smartphones used by field employees, and a variety of IoT devices (like smart TVs, printers, and cameras). Your task is to improve network security. Which of the following is the best strategy for network segmentation?

  • Group all devices based on their physical location in the organization.
  • Separate the network into two segments: one for servers and office computers, and another for smartphones and IoT devices.
  • Segment the network into four groups: servers, office computers, smartphones, and IoT devices.
  • Keep the network as a single segment for easier management.

Question 7)
Imagine an organization experiences a sudden increase in network traffic and suspicious activity. The IT team notices anomalies in user behavior and multiple failed login attempts. Which component of an intrusion detection and prevention system (IDPS) would be responsible for recognizing these patterns and identifying potential threats?

  • Database
  • Sensors
  • Analyzers
  • User Interface

Question 8)
In which of the following scenarios does endpoint security play a crucial role? Select all that apply.

  • An organization implements strict physical access controls and surveillance cameras in their data center.
  • An employee unknowingly clicks on a malicious email attachment, resulting in a ransomware infection that spreads across the organization’s network.
  • An employee accidentally spills coffee on a company-issued smartphone, causing it to malfunction.
  • A remote worker connects to the company’s network using their personal laptop from a coffee shop.

Question 9)
True or False: Regularly adding more rules to the firewall and allowing all outgoing traffic by default are efficient strategies for firewall optimization.

  • True
  • False

Question 10)
Imagine a scenario where employees are allowed to use their personal devices for work purposes. Which of the following are potential risks that organizations should consider when implementing a Bring Your Own Device (BYOD) policy?

  • Data security and privacy concerns.
  • Cost savings for the organization.
  • Compatibility issues between different devices and operating systems.
  • Enhanced employee productivity and satisfaction.

 

Question 11)
True or False: One type of threat to data transfer is data exfiltration.

  • True
  • False

Question 12)
True or False: A replay attack involves an attacker retransmitting captured data in order to trick a system into granting unauthorized access.

  • True
  • False

Question 13)
Which VPN protocol is known for providing the highest level of security due to its use of strong encryption techniques?

  • L2TP
  • PPTP
  • OpenVPN
  • IKEv2

Question 14)
True or False: APT attacks always result in immediate and noticeable harm to the target system or network.

  • True
  • False

Question 15)
True or False: Intrusion Detection and Prevention Systems (IDPS) can only detect and prevent external attacks on a network.

  • True
  • False

Question 16)
In which of the following scenarios does endpoint security play a crucial role? Select all that apply.

  • An employee accidentally spills coffee on a company-issued smartphone, causing it to malfunction.
  • An organization implements strict physical access controls and surveillance cameras in their data center.
  • A remote worker connects to the company’s network using their personal laptop from a coffee shop.
  • An employee unknowingly clicks on a malicious email attachment, resulting in a ransomware infection that spreads across the organization’s network.

Question 17)
As a network administrator, you’ve noticed that your firewall is causing latency issues and slowing down network traffic. What is the best practice to optimize your firewall in this scenario? Select all that apply.

  • Disable the firewall.
  • Add more rules to the firewall.
  • Regularly audit the firewall and remove outdated or redundant rules.
  • Prioritize rules based on their importance.

Question 18)
Imagine a scenario where employees are allowed to use their personal devices for work purposes. Which of the following are potential risks that organizations should consider when implementing a Bring Your Own Device (BYOD) policy?

  • Cost savings for the organization.
  • Enhanced employee productivity and satisfaction.
  • Compatibility issues between different devices and operating systems.
  • Data security and privacy concerns.

Question 19)
Consider a situation where Joey, a bank employee, frequently uses an application to authorize financial transactions. The application requires you to enter a unique passcode sent through email each time you log in. One day, Joey notices multiple unauthorized transactions from the same account, each using the same passcode they had used for a previous legitimate transaction. Based on this scenario, which data transmission threat is most likely being exploited?

  • Eavesdropping
  • Brute force attack
  • Man-in-the-middle attack
  • Replay attack

Question 20)
Jerry frequently travels for work and often uses public Wi-Fi at airports and coffee shops to access sensitive company data. What should Jerry use to ensure their data is secure during transmission?

  • Virtual private network (VPN)
  • Anti-virus software
  • Firewall
  • Incognito mode in a browser

Question 21)
You’ve set up a series of video surveillance cameras in your home without implementing any security measures. One day while monitoring the network, you discovered that these cameras are regularly sending traffic to unknown external IP addresses. What could be the reason?

  • The cameras automatically update their firmware.
  • The cameras are transferring data to other IoT devices in the house.
  • The cameras are backing up data to cloud storage.
  • The cameras have been compromised and are part of a botnet.

Question 22)
Why is network segmentation important for an organization’s network security?

  • Network segmentation makes the network easier to manage.
  • Network segmentation is important because it allows every device to communicate with each other without restrictions.
  • Network segmentation is always required.
  • Network segmentation improves security by limiting the spread of threats and reducing the attack surface.

Question 23)
Why is endpoint security extremely important for an organization?

  • To protect sensitive data from unauthorized access and data breaches.
  • To defend against insider threats and employee misconduct.
  • To ensure uninterrupted network traffic and infrastructure stability.
  • To prevent physical theft of company assets and equipment.

Question 24)
Which of the following are common threats to data transmission? Select all that apply.

  • Man-in-the-middle attacks
  • Data exfiltration
  • Phishing
  • Eavesdropping

Question 25)
For a network administrator seeking to capture and analyze network packets to troubleshoot a problem, which of the following tools is most suitable? Select all that apply.

  • Firewall
  • Wireshark
  • Ettercap
  • The Router

Question 26)
What are some of the prevention strategies that can be effective against advanced persistent threat (APT) attacks? Select all that apply.

  • Keeping the entire network connected and without segmentation.
  • Educating users about the dangers of phishing and how to identify suspicious emails.
  • Ignoring unusual network activity as a minor glitch.
  • Regularly updating and patching systems.

Question 27)
Which of the following statements about IoT botnets is correct? Select all that apply.

  • IoT botnets are primarily made up of computing devices like desktops and laptops.
  • IoT devices cannot be attacked easily when they are behind firewalls.
  • IoT botnets are used to carry out distributed denial-of-service (DDoS) attacks.
  • The Mirai botnet is an example of an IoT botnet.

Question 28)
True or False: Endpoint security solely focuses on protecting desktop computers and laptops within an organization.

  • True
  • False

Question 29)
True or False: Network segmentation only serves to increase network performance and has no impact on security.

  • True
  • False

Question 30)
What is the role of sensors in an intrusion detection and prevention system (IDPS)?

  • Managing user access and permissions.
  • Capturing and monitoring network traffic.
  • Analyzing patterns and behaviors.
  • Storing known attack signatures.

Question 31)
Which of the following steps are valid to optimize the firewall? Select all that apply.

  • Regularly update firewall software.
  • Implement monitoring and logging.
  • Increase the number of firewall rules to improve security.
  • Allow all incoming connections to reduce firewall load.

Question 32)
Which of the following are the benefits when an organization implements a BYOD policy? Select all that apply.

  • Improved productivity and efficiency.
  • Decreased security risks and data breaches.
  • Increased device standardization and control.
  • Increased employee satisfaction and morale.

Question 33)
True or False: Implementing app whitelisting and blacklisting processes is recommended when enabling a BYOD policy for employees.

  • True
  • False