All Coursera Quiz Answers

Palo Alto Networks Network Security Fundamentals NSF Final Exam Quiz Answers

In this article i am gone to share Coursera Course: Palo Alto Networks Network Security Fundamentals | Palo Alto Networks Network Security Fundamentals NSF Final Exam Quiz Answers with you..

Enroll Link: Palo Alto Networks Network Security Fundamentals

About this Course

In this Network Security Fundamentals course you will gain an understanding of the fundamental tenants of network security and review the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course you will be able to describe general network security concepts and implement basic network security configuration techniques.

Also visit: Palo Alto Networks Network Security Fundamentals Module 2 to Module 6 Quiz Answers

 

Palo Alto Networks Network Security Fundamentals NSF Final Exam Quiz Answers

Question 1)
What is the decimal equivalent of 1110?

  • 10
  • 12
  • 14
  • 16

Question 2)
What is the binary equivalent of 250?

  • 1111 1100
  • 1111 1010
  • 1111 1001
  • 1111 1000

Question 3)
Identify the broadcast address from the following.

  • 192.168.0.255/16
  • 192.168.12.127/25
  • 214.19.21.255/14
  • 10.24.36.48/28

Question 4)
Which address class is within the range of 192 to 223?

  • Class A
  • Class B
  • Class C
  • Class D

Question 5)
An IPv6 address is structured with how many bits?

  • 32
  • 48
  • 64
  • 128
  • 256

Question 6)
What is another term for a logical address?

  • IP Address
  • Physical Address
  • MAC Address
  • Burned-In Address

Question 7)
Which subnetwork is 192.168.25.50/28 on?

  • 192.168.0.0
  • 192.168.25.64
  • 192.168.25.48
  • 192.168.25.0

Question 8)
Which area network separates the control and management processes from the underlying networking hardware, making them available as software that can be easily configured and deployed?

  • LAN
  • WAN
  • SD-WAN
  • CAN

Question 9)
Which DNS record type specifies authoritative information about a DNS zone such as a primary name server, email address of the domain administrator, and domain serial number?

  • SOA – Start for Authority:
  • NS – Name Server:
  • PTR – Pointer:
  • CNAME – Canonical Name:

Question 10)
Which IoT technology is backed by ultra-low latency, massive connectivity and scalability for IoT devices, more efficient use of licensed spectrum, and network slicing for application traffic prioritization?

  • 2G
  • 3G
  • 4G
  • 5G

Question 11)
Which network device is essentially an intelligent hub that uses physical addresses to forward data packets to devices on a network?

  • Switch
  • Router
  • Firewall
  • Server

Question 12)
Which layer of the hierarchical networking model is responsible for high-speed routing and switching? Routers and switches at this layer are designed for high-speed packet routing and forwarding.

  • Access
  • Core
  • Distribution
  • Internet

Question 13)
Which type of extranet will allow businesses within an industry to share information or integrate shared business processes?

  • Storage Area Network – SAN
  • Metropolitan Area Network – MAN
  • Campus Area Network – CAN
  • Value Add Network – VAN

Question 14)
Which task is typically not included in server and system administration duties?

  • Account provisioning and de-provisioning
  • Managing account permissions
  • Installing and maintaining server software
  • Maintaining and optimizing network devices

Question 15)
Which application identification technique determines whether the initially detected application protocol is the “real one” or if it is being used as a tunnel to hide the actual application – for example, _Tor _might run inside HTTPS.

  • Application protocol detection and decryption
  • Application protocol decoding
  • Application signatures
  • Heuristics

Question 16)
Which Content-ID filtering capability controls the transfer of sensitive data patterns such as credit card and social security numbers in application content and attachments?

  • File blocking by type
  • Data filtering
  • File transfer function control
  • File filtering by size

Question 17)
Which Linux command gives you extensive help on how to use a command?

  • help
  • more
  • man
  • guide

Question 18)
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages.

  • URL Filtering
  • Wildfire
  • Threat Prevention
  • DNS Security

Question 19)
On the NGFW, which type of User-ID technique can be configured to probe Microsoft Windows servers for active network sessions of a user?

  • Client Probing
  • Server Probing
  • Internet Probing
  • Connection Probing

Question 20)
Characteristics of unified threat management (UTM) include all of the following except:

  • Combines security functions such as firewalls, intrusion detection systems (IDS), anti-malware, and data loss prevention (DLP) in a single appliance.
  • Enabling all of the security functions in a UTM device can have a significant performance impact.
  • UTM fully integrates all of the security functions installed on the device.
  • UTM can be a convenient solution for small networks.

Question 21)
Characteristics of application firewalls include all of the following except:

  • Proxies traffic rather than permitting direct communication between hosts
  • Can be used to implement strong user authentication
  • Masks the internal network from untrusted networks
  • Is extremely fast and has no impact on network performance

Question 22)
Which VPN technology is currently considered the preferred method for securely connecting a remote endpoint device back to an enterprise network?

  • Point-to-point Tunneling protocol – PPTP
  • Secure Socket Layer – SSL
  • Secure Socket tunneling protocol – SSTP
  • Internet Protocol Security – IPSEC

Question 23)
At which Data Link sublayer does the physical address reside?

  • Media Access Control – MAC
  • Logical Link Control – LLC
  • Data Access Control – DAC
  • Network Access Control – NAC

Question 24)
HTTPS interacts with which OSI layer?

  • Application
  • Physical
  • Data Link
  • Session

Question 25)
Which OSI layer handles flow control, data segmentation, and reliability?

  • Application
  • Physical
  • Transport
  • Data Link

Question 26)
At which OSI layer does the PDU contain sequence and acknowledgement numbers?

  • Application
  • 4
  • Data Link
  • 6

Question 27)
Which OSI layer determines the route a packet takes from sender to receiver?

  • 7
  • 1
  • 3
  • 4

Question 28)
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?

  • 6
  • 3
  • 2
  • 5

Question 29)
Which layer of the OSI model does Project 802 divide into two sublayers?

  • Physical
  • Data Link
  • Network
  • Session

Question 30)
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?

  • De-encapsulation
  • Encapsulation
  • PDU stripping
  • Packetization

Question 31)
Which of the following problems can occur at the Physical layer of the OSI Model?

  • NIC driver problems
  • Incorrect IP addresses
  • Signal errors caused by noise