connect and protect networks and network security coursera weekly challenge 1 answers

Test your knowledge: Introduction to networks

1. To connect an entire city, the most effective network type would be a local area network (LAN).

  • True
  • False

2. A security professional wants to ensure information is being broadcast properly to every computer on their organization’s network. What device should they investigate?

  • Hub
  • Modem
  • Internet
  • Router

3. What are some benefits of switches? Select all that apply.

  • They automatically install device-protection software.
  • They can improve network performance.
  • They control the flow of traffic.
  • They only pass data to the intended destination.

4. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.

  • website
  • connected
  • cloud
  • uploadable

Test your knowledge: Network communication

5. What type of information is contained within the header of an IP packet?

  • The message that needs to be transmitted to the receiving device
  • An explanation of how the port number will be processed by the receiving device
  • The sender’s IP address, the size of the packet, and the protocol to use
  • A string of data indicating that the data transmission is complete

6. What characteristics do the TCP/IP and OSI models share? Select all that apply.

  • Both models define standards for networking and divide the network communication process into different layers.
  • Both models include an application and a transport layer.
  • Both models illustrate network processes and protocols for data transmission between two or more systems.
  • Both models have 7 layers.

7. What is the Transmission Control Protocol (TCP)?

  • A software application that organizes data
  • An internet communication convention
  • Guidelines for proper network operations
  • A unique address that every device on a network is assigned

8. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.

  • channel
  • segment
  • port
  • packet

9. Which layer of the TCP/IP model has protocols that organize file transfers and email services?

  • Internet layer
  • Transport layer
  • Network access layer
  • Application layer

Test your knowledge: Local and wide network communication

10. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.

  • speed
  • location
  • operating system
  • size

11. Which of the following is an example of an IPv4 address?

  • 25, 443, 20
  • 172.16.254.1
  • 2001:0db8:85a3:0000:0000:8a2e:0370:7336
  • 00-B1-D0-63-C2-26

12. What is the term for an address assigned by an internet service provider that is shared by all devices on a local area network?

  • Private IP address
  • MAC address
  • WAN address
  • Public IP address

13. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.

  • address table
  • geographic location
  • home network
  • public address

Weekly challenge 1

14. What is the term for a group of connected devices?

  • Cloud
  • Hub
  • Protocol
  • Network

15. A _____ broadcasts information to every device on the network.

  • hub
  • modem
  • router
  • switch

16. Which of the following statements accurately describe switches? Select all that apply.

  • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
  • Some benefits to switches are effective control of traffic flow and improved network performance.
  • Switches are less secure than hubs.
  • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.

17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.

  • A CSP provides business analytics to monitor web traffic and sales.
  • CSP services may be accessed even when a business is not connected to the internet.
  • CSP remote servers allow web applications to be accessed from any location.
  • A CSP offers processing power that is only paid for as needed.

18. What is the purpose of the protocol number of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To signal to the receiving device that the packet is finished
  • To contain the IP and MAC addresses
  • To tell the receiving device what to do with the information in the packet

19. What are the three main categories of services that CSPs provide? Select all that apply.

  • Software as a service (SaaS)
  • Platform as a service (PaaS)
  • Desktop as a service (DaaS)
  • Infrastructure as a service (IaaS)

20. A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?

  • 443
  • 40
  • 20
  • 25

21. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?

  • MAC
  • IPv4
  • IPv6
  • Ethernet

23. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?

  • MAC
  • Ethernet
  • IPv4
  • IPv6

24. What type of network spans an office building, a school, or a home?

  • Modem
  • Cloud
  • WAN
  • LAN

25. Which network device makes connections between specific devices on a network by sending and receiving data between them?

  • A switch
  • A router
  • A hub
  • A modem

26. Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.

  • CSP data and devices are more secure because they are stored locally.
  • CSP remote servers allow online services to be accessed from any location.
  • CSPs provide business analytics to monitor web traffic and sales.
  • CSPs offer on-demand storage.

27. Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.

  • Cloud computing
  • Software defined networks (SDNs)
  • Hybrid cloud environment
  • Local area network (LAN)

28. Which one of the following port numbers is used for large file transfers?

  • 25
  • 37
  • 20
  • 443

29. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.

  • Layer 1, network access
  • Layer 2, internet
  • Layer 3, transport
  • Layer 4, application

30. Which of the following addresses is an accurate IPv4 address?

  • 129.168.10.256
  • 1001.2345.3234.5678
  • 192.168.0.2
  • 100.234.56.1.3

31. Which of the following addresses is an accurate IPv6 address?

  • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
  • fda2::7361:135b::38f5:c8bd:1b3e:2578
  • a360::abf7:h234:0011:g126:1130::ffj2
  • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff

32. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.

  • Modem
  • LAN
  • WAN
  • Cloud

33. Which network device connects multiple networks together?

  • A hub
  • A router
  • A switch
  • A modem

34. Fill in the blank: A ___ is a device that makes connections between specific devices on a network by sending and receiving data between them.

  • switch
  • hub
  • modem
  • router

35. What information is included in the body of a data packet?

  • The protocol number
  • The MAC address
  • The message to be transmitted to the receiving device
  • The signal that tells the receiving device that the packet is finished transferring

36. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.

  • Decreased cost
  • Increased scalability
  • Decreased use of physical network devices
  • Increased attack surface

37. What is the purpose of the footer of a data packet?

  • To identify the message to be transmitted to the receiving device
  • To show the MAC address of the destination device
  • To signal to the receiving device that the packet is finished
  • To contain the source IP address

38. Fill in the blank: 127.0.0.1 is an example of an accurate ___ address.

  • Ethernet
  • IPv6
  • MAC
  • IPv4

Leave a Reply