All Coursera Quiz Answers

Module quiz: Network devices and protocols Quiz Answers

In this article i am gone to share Coursera Course: Introduction to Networking and Cloud Computing Week 2 | Module quiz: Network devices and protocols Quiz Answers with you..

Enrol Link:ย  Introduction to Networking and Cloud Computing

 

Module quiz: Network devices and protocols Quiz Answers

Question 1)
When joining networks and subnets, a _______ is used to connect the different network areas.

  • Router
  • Switch
  • Firewall

Question 2)
The application layer in the TCP/IP suite brings together which three layers from the OSI model? Choose all that apply.

  • Presentation
  • Session
  • Application
  • Internet

Question 3)
True or False: When using a private and public cloud together, they form a hybrid cloud.

  • True
  • False

Question 4)
Virtual private network (VPN) technology can be used to connect to private and public clouds using _______ VPNs and site-to-site VPNs.

  • Office
  • User
  • Remote

Question 5)
SMTP, IMAP, and POP3 are protocols used within what application?

  • Remote connectivity application
  • Email
  • Web browsers

Question 6)
HTTPS uses which two protocols to encrypt web content traffic to prevent a man-in-the-middle attack?

  • SSH
  • TLS
  • SSL
  • FTPS

Question 7)
True or False: For secure web browsing port number 80 is used with HTTPS and for unsecured browsing port number 443 is used with HTTP.

  • True
  • False

Question 8)
True or False: DNS is critical to the use of the internet but DNS hijacking, spoofing and amplification are types of attacks that make it very vulnerable.

  • True
  • False

Question 9)
True or False: Traffic prioritization and marking packets are part of the quality of service (QOS) suite of network management mechanisms.

  • True
  • False

Question 10)
True or False: When searching through log files, using the Windows command prompt application and the findstr command helps to filter down what you are looking for.

  • True
  • False

 

Question 11)
What device is needed when joining different networks and subnets together?

  • Switch
  • Router
  • Firewall

Question 12)
What type of cloud setup do you have if you use your own private cloud as well as services from the public cloud?

  • Cloud of clouds
  • Hybrid cloud
  • Cloud
  • Multi-cloud

Question 13)
VPNs can be used to connect offices and home users to public and private cloud setups, but what are the two VPN types needed?

  • Site-to-site
  • VPN home
  • Remote
  • VPN client

Question 14)
True or False: HTTPS is the best protocol for a secure connection while surfing the web with your browser.

  • True
  • False

Question 15)
When using a web browser, the HTTP protocol uses port number 80 but what port number does HTTPS use?

  • 22
  • 8080
  • 443
  • 8000

Question 16)
Traffic management involves many different mechanisms that form part of which suite?

  • Metric analysis
  • Quality of service (QOS)
  • Network availability

Question 17)
True or False: A switch is used to join different networks and subnets together.

  • True
  • False

Question 18)
Email can use which three protocols? Choose all that apply.

  • POP3
  • SMTP
  • FTP
  • IMAP

Question 19)
Port number ____ is used with HTTP and port number ____ is used with HTTPS when using a web browser.

  • 22, 8000
  • 443, 80
  • 80, 443
  • 8000, 22

Question 20)
DNS is a protocol critical to the use of the internet but because it’s widely used it’s vulnerable to what kind of attacks? Choose all that apply.

  • DNS hijacking
  • DNS amplification
  • DNS spoofing
  • DNS ghosting

Question 21)
Which of the following options are traffic management mechanisms from the quality of service (QOS) suite? Choose all that apply.

  • Traffic prioritization
  • Traffic Jitter
  • Traffic latency
  • Traffic marking

Question 22)
The hybrid cloud is made up of which cloud setup types? Choose all that apply.

  • Private cloud
  • Public cloud
  • Multi-cloud
  • Cloud of clouds

Question 23)
DNS is critical to the use of the internet but it’s vulnerable to attack. What type of attack overwhelms a target device with hundreds of DNS messages?

  • DNS tunneling
  • DNS Spoofing
  • DNS hijacking
  • DNS amplification

Question 24)
VPNs can be used to connect offices to public and private cloud setups, but what kind of VPN can be used to connect to the office network from home?

  • Site-to-site
  • Home
  • Remote

Question 25)
True or False: The TCP/IP suite combines the OSI model’s application, presentation and session layers into one application layer.

  • True
  • False

Question 26)
True or False: SMTP, POP3, and SSH are all used within an email application.

  • True
  • False

Question 27)
When selecting protocols to use, it is best to choose a protocol that provides some level of encryption. Which protocol would be best for web page content delivery?

  • HTTP
  • FTPS
  • HTTPS
  • FTP