All Coursera Quiz Answers

Module quiz: Network security Quiz Answers

In this article i am gone to share Coursera Course: Introduction to Networking and Cloud Computing Week 3 | Module quiz: Network security Quiz Answers with you..

Enrol Link:  Introduction to Networking and Cloud Computing

 

Module quiz: Network security Quiz Answers

Question 1)
Publish-subscribe is a type of client-server model where clients receive updates from the server on specific events. What other client-server models can you identify? Select all that apply.

  • Request-query-subscribe model
  • Publish-query model
  • Request-response model
  • Peer-to-peer model (P2P)

Question 2)
What components can be used to create rules within a firewall? Select all that apply.

  • Direction
  • Password
  • Source IP address
  • Protocol

Question 3)
True or False: Contemporary firewalls evolved from the very first type of firewall, the packet-filtering firewall.

  • True
  • False

Question 4)
A ____________ attack involves intercepting communication between two parties and relaying information between them so they are unaware of the attack.

  • IP spoofing
  • Eavesdropping
  • Man-in-the-middle
  • Backdoors

Question 5)
True or False: Change control is a great way to test and look for threats on the network.

  • True
  • False

Question 6)
What is network sniffing?

  • Listening to the communication between two network devices
  • Gaining unauthorized access to a network
  • Spreading malware
  • Cracking a password

Question 7)
What tier of authorization provides the lowest level of access?

  • User access
  • Administrator access
  • Guest access
  • Conditional access

Question 8)
Identify types of authorization protocols. Select all that apply.

  • TLS
  • TACACS+
  • LDAP
  • RADIUS

Question 9)
How many steps are involved in the DHCP IP address assignment process?

  • 4
  • 8
  • 6

Question 10)
True or False: DHCP relay is used to forward DHCP requests blocked by routers on the network.

  • True
  • False

 

Question 11)
True or False: The publish-subscribe server model allows clients to send requests to the server to query its database.

  • True
  • False

Question 12)
True or False: Firewall rules are created using a list of usernames and passwords of who can access what service.

  • True
  • False

Question 13)
What firewalls have evolved from the very first type, the packet-filtering firewall? Select all that apply.

  • Stateful firewall
  • Stateless firewall
  • Next-generation firewall
  • Third-generation firewalls

Question 14)
True or False: A man-in-the-middle attack involves intercepting communication between two parties.

  • True
  • False

Question 15)
What steps are involved in the DHCP IP address assignment, and in what order? Select all that apply.

  • The first two steps are DHCP discover, then DHCP offer
  • The second two steps are DHCP discover, then DHCP offer
  • The first two steps are DHCP request, then DHCP acknowledgement
  • The second two steps are DHCP request and then DHCP acknowledgement

Question 16)
When a router is in the way of a DHCP request, a DHCP ____ is needed to forward the request to the DHCP server.

  • Client
  • Server
  • Passer
  • Relay

Question 17)
Different components, including source and destination IP addresses, protocols and ports are used to form firewall _______.

  • Blockages
  • Authorization
  • Rules
  • Access

Question 18)
Which of these are types of authorization protocols?

  • RADIUS, LDAP, TACAC+
  • LDAP, TLS, RADIUS
  • LDAP, SSL, RADIUS

Question 19)
When a router is in the way of a DHCP request, what is needed to forward the request on behalf of the DHCP client?

  • DHCP server
  • DHCP passer
  • DHCP relay
  • DHCP client

Question 20)
Many firewalls that exist today are still based on the very first type that simply permitted or denied packets based upon a set of rules. What is this firewall called?

  • Packet-filtering
  • Stateful firewalls
  • Proxy server firewalls
  • Application-layer firewalls

Question 21)
True or False: Guest access is a high-level tier of authorization.

  • True
  • False

Question 22)
What two network analysis procedures can be used to identify threats and check for potential vulnerability?

  • Change control
  • Continuous monitoring
  • Penetration testing

Question 23)
Guest access is the lowest authorization tier, but what other tiers have the highest authorization level to manage the system? Select all that apply.

  • Superuser access
  • User access
  • Conditional access
  • Administrator access

Question 24)
True or False: DHCP IP address assignment involves four steps: DHCP discover, offer, request, and acknowledgement.

  • True
  • False

Question 25)
What type of network attack involves an attacker intercepting communication between two parties who are unaware that someone else is listening because traffic seems to flow normally?

  • Eavesdropping
  • IP spoofing
  • Man-in-the-middle
  • Backdoors

Question 26)
What network analysis procedure involves testing users by sending fake or suspicious emails?

  • Continuous monitoring
  • Change control
  • Penetration testing

Question 27)
True or False: Manipulating data packets to impersonate another device or user is known as spoofing.

  • True
  • False

Question 28)
True or False: RADIUS, TACACS and LDAP are all types of authorization protocols.

  • True
  • False