connect and protect networks and network security coursera weekly challenge 1 answers
Test your knowledge: Introduction to networks
1. To connect an entire city, the most effective network type would be a local area network (LAN).
- True
- False
2. A security professional wants to ensure information is being broadcast properly to every computer on their organization’s network. What device should they investigate?
- Hub
- Modem
- Internet
- Router
3. What are some benefits of switches? Select all that apply.
- They automatically install device-protection software.
- They can improve network performance.
- They control the flow of traffic.
- They only pass data to the intended destination.
4. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.
- website
- connected
- cloud
- uploadable
Test your knowledge: Network communication
5. What type of information is contained within the header of an IP packet?
- The message that needs to be transmitted to the receiving device
- An explanation of how the port number will be processed by the receiving device
- The sender’s IP address, the size of the packet, and the protocol to use
- A string of data indicating that the data transmission is complete
6. What characteristics do the TCP/IP and OSI models share? Select all that apply.
- Both models define standards for networking and divide the network communication process into different layers.
- Both models include an application and a transport layer.
- Both models illustrate network processes and protocols for data transmission between two or more systems.
- Both models have 7 layers.
7. What is the Transmission Control Protocol (TCP)?
- A software application that organizes data
- An internet communication convention
- Guidelines for proper network operations
- A unique address that every device on a network is assigned
8. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.
- channel
- segment
- port
- packet
9. Which layer of the TCP/IP model has protocols that organize file transfers and email services?
- Internet layer
- Transport layer
- Network access layer
- Application layer
Test your knowledge: Local and wide network communication
10. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.
- speed
- location
- operating system
- size
11. Which of the following is an example of an IPv4 address?
- 25, 443, 20
- 172.16.254.1
- 2001:0db8:85a3:0000:0000:8a2e:0370:7336
- 00-B1-D0-63-C2-26
12. What is the term for an address assigned by an internet service provider that is shared by all devices on a local area network?
- Private IP address
- MAC address
- WAN address
- Public IP address
13. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.
- address table
- geographic location
- home network
- public address
Weekly challenge 1
14. What is the term for a group of connected devices?
- Cloud
- Hub
- Protocol
- Network
15. A _____ broadcasts information to every device on the network.
- hub
- modem
- router
- switch
16. Which of the following statements accurately describe switches? Select all that apply.
- When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
- Some benefits to switches are effective control of traffic flow and improved network performance.
- Switches are less secure than hubs.
- A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.
- A CSP provides business analytics to monitor web traffic and sales.
- CSP services may be accessed even when a business is not connected to the internet.
- CSP remote servers allow web applications to be accessed from any location.
- A CSP offers processing power that is only paid for as needed.
18. What is the purpose of the protocol number of a data packet?
- To identify the message to be transmitted to the receiving device
- To signal to the receiving device that the packet is finished
- To contain the IP and MAC addresses
- To tell the receiving device what to do with the information in the packet
19. What are the three main categories of services that CSPs provide? Select all that apply.
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Desktop as a service (DaaS)
- Infrastructure as a service (IaaS)
20. A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?
- 443
- 40
- 20
- 25
21. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?
- Layer 1, network access
- Layer 2, internet
- Layer 3, transport
- Layer 4, application
22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?
- MAC
- IPv4
- IPv6
- Ethernet
23. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?
- MAC
- Ethernet
- IPv4
- IPv6
24. What type of network spans an office building, a school, or a home?
- Modem
- Cloud
- WAN
- LAN
25. Which network device makes connections between specific devices on a network by sending and receiving data between them?
- A switch
- A router
- A hub
- A modem
26. Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.
- CSP data and devices are more secure because they are stored locally.
- CSP remote servers allow online services to be accessed from any location.
- CSPs provide business analytics to monitor web traffic and sales.
- CSPs offer on-demand storage.
27. Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.
- Cloud computing
- Software defined networks (SDNs)
- Hybrid cloud environment
- Local area network (LAN)
28. Which one of the following port numbers is used for large file transfers?
- 25
- 37
- 20
- 443
29. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.
- Layer 1, network access
- Layer 2, internet
- Layer 3, transport
- Layer 4, application
30. Which of the following addresses is an accurate IPv4 address?
- 129.168.10.256
- 1001.2345.3234.5678
- 192.168.0.2
- 100.234.56.1.3
31. Which of the following addresses is an accurate IPv6 address?
- fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
- fda2::7361:135b::38f5:c8bd:1b3e:2578
- a360::abf7:h234:0011:g126:1130::ffj2
- a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
32. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.
- Modem
- LAN
- WAN
- Cloud
33. Which network device connects multiple networks together?
- A hub
- A router
- A switch
- A modem
34. Fill in the blank: A ___ is a device that makes connections between specific devices on a network by sending and receiving data between them.
- switch
- hub
- modem
- router
35. What information is included in the body of a data packet?
- The protocol number
- The MAC address
- The message to be transmitted to the receiving device
- The signal that tells the receiving device that the packet is finished transferring
36. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.
- Decreased cost
- Increased scalability
- Decreased use of physical network devices
- Increased attack surface
37. What is the purpose of the footer of a data packet?
- To identify the message to be transmitted to the receiving device
- To show the MAC address of the destination device
- To signal to the receiving device that the packet is finished
- To contain the source IP address
38. Fill in the blank: 127.0.0.1 is an example of an accurate ___ address.
- Ethernet
- IPv6
- MAC
- IPv4