Module quiz: Network security Quiz Answers
In this article i am gone to share Coursera Course: Introduction to Networking and Cloud Computing Week 3 | Module quiz: Network security Quiz Answers with you..
Enrol Link: Introduction to Networking and Cloud Computing
Module quiz: Network security Quiz Answers
Question 1)
Publish-subscribe is a type of client-server model where clients receive updates from the server on specific events. What other client-server models can you identify? Select all that apply.
- Request-query-subscribe model
- Publish-query model
- Request-response model
- Peer-to-peer model (P2P)
Question 2)
What components can be used to create rules within a firewall? Select all that apply.
- Direction
- Password
- Source IP address
- Protocol
Question 3)
True or False: Contemporary firewalls evolved from the very first type of firewall, the packet-filtering firewall.
- True
- False
Question 4)
A ____________ attack involves intercepting communication between two parties and relaying information between them so they are unaware of the attack.
- IP spoofing
- Eavesdropping
- Man-in-the-middle
- Backdoors
Question 5)
True or False: Change control is a great way to test and look for threats on the network.
- True
- False
Question 6)
What is network sniffing?
- Listening to the communication between two network devices
- Gaining unauthorized access to a network
- Spreading malware
- Cracking a password
Question 7)
What tier of authorization provides the lowest level of access?
- User access
- Administrator access
- Guest access
- Conditional access
Question 8)
Identify types of authorization protocols. Select all that apply.
- TLS
- TACACS+
- LDAP
- RADIUS
Question 9)
How many steps are involved in the DHCP IP address assignment process?
- 4
- 8
- 6
Question 10)
True or False: DHCP relay is used to forward DHCP requests blocked by routers on the network.
- True
- False
Question 11)
True or False: The publish-subscribe server model allows clients to send requests to the server to query its database.
- True
- False
Question 12)
True or False: Firewall rules are created using a list of usernames and passwords of who can access what service.
- True
- False
Question 13)
What firewalls have evolved from the very first type, the packet-filtering firewall? Select all that apply.
- Stateful firewall
- Stateless firewall
- Next-generation firewall
- Third-generation firewalls
Question 14)
True or False: A man-in-the-middle attack involves intercepting communication between two parties.
- True
- False
Question 15)
What steps are involved in the DHCP IP address assignment, and in what order? Select all that apply.
- The first two steps are DHCP discover, then DHCP offer
- The second two steps are DHCP discover, then DHCP offer
- The first two steps are DHCP request, then DHCP acknowledgement
- The second two steps are DHCP request and then DHCP acknowledgement
Question 16)
When a router is in the way of a DHCP request, a DHCP ____ is needed to forward the request to the DHCP server.
- Client
- Server
- Passer
- Relay
Question 17)
Different components, including source and destination IP addresses, protocols and ports are used to form firewall _______.
- Blockages
- Authorization
- Rules
- Access
Question 18)
Which of these are types of authorization protocols?
- RADIUS, LDAP, TACAC+
- LDAP, TLS, RADIUS
- LDAP, SSL, RADIUS
Question 19)
When a router is in the way of a DHCP request, what is needed to forward the request on behalf of the DHCP client?
- DHCP server
- DHCP passer
- DHCP relay
- DHCP client
Question 20)
Many firewalls that exist today are still based on the very first type that simply permitted or denied packets based upon a set of rules. What is this firewall called?
- Packet-filtering
- Stateful firewalls
- Proxy server firewalls
- Application-layer firewalls
Question 21)
True or False: Guest access is a high-level tier of authorization.
- True
- False
Question 22)
What two network analysis procedures can be used to identify threats and check for potential vulnerability?
- Change control
- Continuous monitoring
- Penetration testing
Question 23)
Guest access is the lowest authorization tier, but what other tiers have the highest authorization level to manage the system? Select all that apply.
- Superuser access
- User access
- Conditional access
- Administrator access
Question 24)
True or False: DHCP IP address assignment involves four steps: DHCP discover, offer, request, and acknowledgement.
- True
- False
Question 25)
What type of network attack involves an attacker intercepting communication between two parties who are unaware that someone else is listening because traffic seems to flow normally?
- Eavesdropping
- IP spoofing
- Man-in-the-middle
- Backdoors
Question 26)
What network analysis procedure involves testing users by sending fake or suspicious emails?
- Continuous monitoring
- Change control
- Penetration testing
Question 27)
True or False: Manipulating data packets to impersonate another device or user is known as spoofing.
- True
- False
Question 28)
True or False: RADIUS, TACACS and LDAP are all types of authorization protocols.
- True
- False