All Coursera Quiz Answers

Network Security Support Fundamentals Coursera Quiz Answers

In this article i am gone to share Coursera Course: Network Security Support Fundamentals by CompTIA | All Weeks Quiz Answers | Network Security Support Fundamentals Coursera Quiz Answers with you..

Enrol Link:  Network Security Support Fundamentals

Network Security Support Fundamentals Coursera Quiz Answers


 

WEEK 1 QUIZ ANSWERS

Practice Quiz: Describe Enterprise Campus Networks Quiz Answers

Question 1)
You are assisting a company which expects to have to expand staff numbers and IT systems rapidly in the next six months. To help them clarify expectations for implementing a larger network, identify which of the following statements about enterprise networks are true. (Select two)

  • Enterprise networks must implement printing solutions.
  • Enterprise networks can span multiple floors in a building.
  • Enterprise networks do not use wireless networks.
  • Enterprise networks use specialized software to manage and organize users and resources, and provide a high level of security.

Question 2)
A company is moving to larger premises. Currently, their computers are simply attached to a networking appliance using flexible patch cords or Wi-Fi links. You need to help them understand the components of a structured cabling system, which will be a requirement in their larger premises.
Which of the following components is used to terminate the cable running from behind a wall plate?

  • Switch
  • Router
  • Access point
  • Patch panel

Question 3)
You are assisting a company which expects to have to expand staff numbers and IT systems rapidly in the next six months. To help them clarify expectations for implementing a larger network, you are explaining that different types of network switching appliances are likely to be required.
Which switching layer allows client and server computers to connect to the network?

  • Hierarchical
  • Distribution
  • Access
  • Core

Question 4)
A company is assessing requirements for wireless connectivity. For best performance, access points must be ceiling-mounted. However, there is no opportunity to provision power outlets for ceiling-mounted units. Which of the following options could resolve this?

  • Install patch panels, which do not need power.
  • Install power outlets.
  • Use Power over Ethernet (PoE).
  • Wireless access points do not need power.

Question 5)
What type of device must a company deploy to facilitate Internet access?

  • Switch
  • WAN
  • Router
  • Access point

 

Practice Quiz: Describe the Role of Data Centers and Virtualization Quiz Answers

Question 1)
A company is considering requirements for a new data center facility. Which of the following is NOT required?

  • Client PCs
  • Switches and routers
  • Locking cabinets
  • Climate control

Question 2)
You are evaluating cloud infrastructure providers. Marketing literature for one company refers to their ability to “provision or deprovision resources as workloads change.”
Which of the following data center features is this statement most closely aligned with?

  • Elasticity
  • Climate control
  • Reliable power
  • Physical access control

Question 3)
You are assessing requirements for features of systems and servers that will be installed in a data center. Which of the following options relate most closely to data storage redundancy? (Select TWO)

  • Site-to-site replication
  • Redundant disk array
  • Failover network link
  • Load balancing
  • Uninterruptible power supply (UPS)

Question 4)
Your company is evaluating software that allows multiple guest operating systems to run simultaneously on a single hardware server. What type of software is being evaluated?

  • Data center
  • Container
  • Cloud
  • Hypervisor

Question 5)
You are evaluating whether containers might be a good system solution, given your existing Linux server infrastructure. Which of the following statements best describes the main advantage of a container-based solution?

  • Containers deploy lightweight apps that run in any server environment.
  • Containers run multiple operating systems on a single hardware host.
  • Containers are the only virtualization solution in a Linux environment.
  • Containers deploy emulated network and storage

 

 

Enterprise Campus Network Fundamentals Module Assessment Answers

Question 1)
You are the network administrator for a small business. You want to isolate the developer team due to security concerns.
Which of the following methods best accomplishes this goal?

  • Segmentation
  • Patch panels
  • Virtualization
  • Containerization

Question 2)
A coworker asks you for the term that describes periodic changes to network size. Which term is this?

  • Scaling
  • Switching
  • Segmentation
  • Containerization

Question 3)
Which of the following is an advantage of patch panels?

  • Patch panels increase security by isolating physical machines.
  • Patch panels eliminate the need to rerun cable after moving network devices.
  • Patch panels increase security by isolating virtual machines (VMs).
  • Patch panels can convert signals between different types of cables, such as copper and fiber optic.

Question 4)
A coworker asks you for the meaning of the term full duplex. Which choice below correctly describes the concept of full duplex?

  • The network interface can send and receive simultaneously.
  • The network interface can encrypt and decrypt network data.
  • The network interface can connect to multiple switches for redundancy.
  • The network interface can send and receive but not simultaneously.

Question 5)
You’re consulting for a company with a large office building. Your customer wants to figure out the best places to put wireless access points.
What analysis should you do in order to make a recommendation?

  • Do a site survey.
  • Do a vulnerability scan.
  • Do a port scan.
  • Do a wireless scan.

Question 6)
Which of the following options correctly identifies the types of addresses that switches and routers use to make forwarding decisions?

  • Switches forward frames using port addresses; routers forward packets using MAC addresses.
  • Switches forward frames using MAC addresses; routers forward packets using port addresses.
  • Switches forward frames using IP addresses; routers forward packets using MAC addresses.
  • Switches forward frames using MAC addresses; routers forward packets using IP addresses.

Question 7)
A coworker in the IT department wants to authenticate devices that connect to wireless access points. What security practice does this describe?

  • Firewalling
  • Authorization
  • Proxy service
  • Network access controls

Question 8)
You have just been hired in an IT department. You notice that one administrator does backups, and a different administrator handles restores processes.
This is an example of what type of security practice?

  • Isolation
  • Separation of duties
  • Disaster recovery
  • Segmentation

Question 9)
You’re reading a firewall log file and see a filter. Of the options below, which information do firewalls check? (Select TWO.)

  • Segment
  • Operating system (OS)
  • Protocol
  • Source

Question 10)
Your organization is considering constructing a data center. Your boss is worried about the cost of equipment and people.
What type of data center could you suggest to most clearly alleviate these concerns?

  • Off-premises data center
  • Managed data center
  • Hybrid data center
  • On-premises data center

Question 11)
Which of the following is a key feature of a data center?

  • Number of available servers
  • Operating system options
  • Climate control
  • Number of employees

Question 12)
Your company begins working with a cloud service provider. You work in retail selling seasonal items. Demand on your web servers rises and falls throughout the year. What is this an example of?

  • Elasticity
  • Security
  • Segmentation
  • Containerization

Question 13)
A representative from a cloud service provider assures you that your organization’s data is copied between two data centers to avoid data loss if one goes down.
What kind of redundancy is this?

  • Site-to-site
  • Regional
  • Site-to-server
  • Multi-cloud

Question 14)
Which of the choices below are attributes of virtual machines? (Select TWO.)

  • A virtual machine cannot run an operating system.
  • A virtual machine has its own operating system.
  • A virtual machine has its own applications.
  • A virtual machine cannot run applications.

Question 15)
Your organization is standardized on Windows computers, but a developer needs to run a Linux application. What solution can you suggest?

  • Build a Linux virtual machine.
  • Convert the application to the Windows platform.
  • Provide the developer with access to the cloud.
  • Add a Linux network segment to the existing network.

Question 16)
A developer created an application that works on their workstation but not on the server. What virtualization environment could you suggest to avoid the problem?

  • Virtual application
  • Virtual machine
  • Container
  • Segment

Question 17)
Which of these options is a container management tool?

  • Virtualization
  • PowerShell
  • Docker
  • Port Scanning

 

WEEK 3 QUIZ ANSWERS

Practice Quiz: Explain Cybersecurity Resilience Quiz Answers

Question 1)
A company leases premises in an area several hundred kilometers from its main office. The networking technicians install server and networking equipment that will be ready to run services when loaded with a current data set. What specific type of cybersecurity resilience has the company provided?

  • Disaster recovery
  • Fault tolerance
  • High availability
  • Site security

Question 2)
Your organization provides email services with 99% availability. How much downtime per year would the company’s users experience?

  • Email would be unavailable for less than 10 minutes per year.
  • Email would be unavailable for less than one hour per year.
  • Email would be unavailable for a few hours per year.
  • Email would be unavailable for a few days per year.

Question 3)
You are explaining cybersecurity resilience features to executives in order to justify purchasing decisions. Which of the following is an example of redundancy?

  • Installing high-quality components in a server
  • Installing two power supplies in a server
  • Installing a solid-state drive in a server
  • Attaching two monitors to a server

Question 4)
You are explaining types of building access control to help inform design decisions for a new campus network. Which of the following statements best describes biometric security?

  • Biometric security authenticates based on what you have.
  • Biometric security authenticates based on who you are.
  • Biometric security authenticates based on where you are.
  • Biometric security authenticates based on what you know.

Question 5)
You are explaining cybersecurity resilience features to executives in order to justify purchasing decisions. Which of the following statements best describes the differences between hot and cold disaster recovery sites?

  • Cold sites need some equipment and staff before taking over, hot sites already have all equipment and staff.
  • Cold sites need all equipment and staff before taking over, hot sites already have all equipment and staff.
  • Hot sites need some equipment and staff before taking over, cold sites need all equipment and staff before taking over.
  • Hot sites need all equipment and staff before taking over, cold sites already have all equipment and staff.

 

 

Module Assessment


  • Other Network Types Module Assessment

  • Cybersecurity Controls Module Assessment