Coursera Answers

Palo Alto Networks Network Security Fundamentals Quiz Answers

In this article i am gone to share Coursera Course: Palo Alto Networks Network Security Fundamentals | All Weeks Modules Quiz Answers with you.. | Palo Alto Networks Network Security Fundamentals Quiz Answers Coursera

Enroll Link: Palo Alto Networks Network Security Fundamentals

 

Palo Alto Networks Network Security Fundamentals Module 2 Quiz Answers

Question 1)
Which area network separates the control and management processes from the underlying networking hardware, making them available as software that can be easily configured and deployed?

  • LAN
  • WAN
  • SD-WAN
  • CAN

Question 2)
Which DNS record type specifies authoritative information about a DNS zone such as a primary name server, email address of the domain administrator, and domain serial number?

  • SOA – Start for Authority:
  • NS – Name Server:
  • PTR – Pointer:
  • CNAME – Canonical Name:

Question 3)
Which IoT technology is backed by ultra-low latency, massive connectivity and scalability for IoT devices, more efficient use of licensed spectrum, and network slicing for application traffic prioritization?

  • 2G
  • 3G
  • 4G
  • 5G

Question 4)
Which network device is essentially an intelligent hub that uses physical or logical addresses to forward data packets to devices on a network?

  • Switch
  • Router
  • Firewall
  • Server

Question 5)
Which layer of the hierarchical networking model is responsible for high-speed routing and switching? Routers and switches at this layer are designed for high-speed packet routing and forwarding.

  • Access
  • Core
  • Distribution
  • Internet

Question 6)
Which type of extranet will allow businesses within an industry to share information or integrate shared business processes?

  • Storage Area Network – SAN
  • Metropolitan Area Network – MAN
  • Campus Area Network – CAN
  • Value Add Network – VAN

 

Palo Alto Networks Network Security Fundamentals Module 3 Quiz Answers

Question 1)
What is the decimal equivalent of 1110?

  • 10
  • 12
  • 14
  • 16

Question 2)
What is the binary equivalent of 250?

  • 1111 1100
  • 1111 1010
  • 1111 1001
  • 1111 1000

Question 3)
Identify the broadcast address from the following.

  • 192.168.0.255/16
  • 192.168.12.127/25
  • 214.19.21.255/14
  • 10.24.36.48/28

Question 4)
Which address class has a first octet value that is within the range of 192 to 223?

  • Class A
  • Class B
  • Class C
  • Class D

Question 5)
An IPv6 address is structured with how many bits?

  • 32
  • 48
  • 64
  • 128
  • 256

Question 6)
What is another term for a logical address?

  • IP Address
  • Physical Address
  • MAC Address
  • Burned-In Address

Question 7)
Which subnetwork is 192.168.25.50/28 on?

  • 192.168.0.0
  • 192.168.25.64
  • 192.168.25.48
  • 192.168.25.0

 

Palo Alto Networks Network Security Fundamentals Module 4 Quiz Answers

Question 1)
At which Data Link sublayer does the physical address reside?

  • Media Access Control – MAC
  • Logical Link Control – LLC
  • Data Access Control – DAC
  • Network Access Control – NAC

Question 2)
HTTPS interacts with which OSI layer?

  • Application
  • Physical
  • Data Link
  • Session

Question 3)
Which OSI layer handles flow control, data segmentation, and reliability?

  • Application
  • Physical
  • Transport
  • Data Link

Question 4)
At which OSI layer does the PDU contain sequence and acknowledgement numbers?

  • Application
  • 4
  • Data Link
  • 6

Question 5)
Which OSI layer determines the route a packet takes from sender to receiver?

  • 7
  • 1
  • 3
  • 4

Question 6)
Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?

  • 6
  • 3
  • 2
  • 5

Question 7)
Which layer of the OSI model does Project 802 divide into two sublayers?

  • Physical
  • Data Link
  • Network
  • Session

Question 8)
Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?

  • De-encapsulation
  • Encapsulation
  • Labeling.
  • Packetization

Question 9)
Which of the following problems can occur at the Physical layer of the OSI Model?

  • NIC driver problems
  • Incorrect IP addresses
  • Signal errors caused by noise

 

Palo Alto Networks Network Security Fundamentals Module 5 Quiz Answers

Question 1)
Characteristics of unified threat management (UTM) include all of the following except:

  • Combines security functions such as firewalls, intrusion detection systems (IDS), anti-malware, and data loss prevention (DLP) in a single appliance.
  • Enabling all of the security functions in a UTM device can have a significant performance impact.
  • UTM fully integrates all of the security functions installed on the device.
  • UTM can be a convenient solution for small networks.

Question 2)
Characteristics of application firewalls include all of the following except:

  • Proxies traffic rather than permitting direct communication between hosts
  • Can be used to implement strong user authentication
  • Masks the internal network from untrusted networks
  • Is extremely fast and has no impact on network performance

Question 3)
Which VPN technology is currently considered the preferred method for securely connecting a remote endpoint device back to an enterprise network?

  • Point-to-point Tunneling protocol – PPTP
  • Secure Socket Layer – SSL
  • Secure Socket tunneling protocol – SSTP
  • Internet Protocol Security – IPSEC

 

Palo Alto Networks Network Security Fundamentals Module 6 Quiz Answers

Question 1)
Which task is typically not included in server and system administration duties?

  • Account provisioning and de-provisioning
  • Managing account permissions
  • Installing and maintaining server software
  • Maintaining and optimizing network devices

Question 2)
Which application identification technique determines whether the initially detected application protocol is the “real one” or if it is being used as a tunnel to hide the actual application – for example, _Tor _might run inside HTTPS.

  • Application protocol detection and decryption
  • Application protocol decoding
  • Application signatures
  • Heuristics

Question 3)
Which Content-ID filtering capability controls the transfer of sensitive data patterns such as credit card and social security numbers in application content and attachments?

  • File blocking by type
  • Data filtering
  • File transfer function control
  • File filtering by size

Question 4)
Which Linux command gives you extensive help on how to use a command?

  • help
  • more
  • man
  • guide

Question 5)
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages.

  • URL Filtering
  • Wildfire
  • Threat Prevention
  • DNS Security

Question 6)
On the NGFW, which type of User-ID technique can be configured to probe Microsoft Windows servers for active network sessions of a user?

  • Client Probing
  • Server Probing
  • Internet Probing
  • Connection Probing

Also visit: Palo Alto Networks Network Security Fundamentals NSF Final Exam Quiz Answers