connect and protect networks and network security coursera weekly challenge 2 answers

Test your knowledge: Recognize different network protocols

1. Fill in the blank: Network protocols are rules used by two or more devices on a network to describe the _____ and structure of data.

  • access level
  • optimum speed
  • order of delivery
  • maximum size

2. Which network protocol provides a secure method of communication between clients and web servers?

  • TCP
  • ARP
  • HTTPS
  • DNS

3. To keep information safe from malicious actors, what security protocol can be used?

  • Secure sockets layer and transport layer security (SSL/TLS)
  • Address resolution protocol (ARP)
  • Domain name system (DNS)
  • Transmission control protocol (TCP)

4. IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.

  • True
  • False

Test your knowledge: System identification

5. What monitors and filters traffic coming in and out of a network?

  • Domain name system (DNS)
  • Firewall
  • Forward proxy server
  • Uncontrolled zone

6. Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.

  • True
  • False

7. Fill in the blank: Encapsulation is a process performed by a _____ that protects information by wrapping sensitive data in other data packets.

  • firewall
  • VPN service
  • proxy server
  • security zone

8. Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?

  • Management zone
  • Uncontrolled zone
  • Restricted zone
  • Demilitarized zone (DMZ)

9. Fill in the blank: A security analyst uses a _____ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.

  • reverse proxy server
  • port filter
  • controlled zone
  • forward proxy server

Weekly challenge 2

10. What network protocol translates the domain name of a website’s server into an IP address?

  • File transfer protocol (FTP)
  • Domain name system (DNS)
  • Transmission control protocol (TCP)
  • Hypertext transfer protocol secure (HTTPS)

11. Which of the following statements accurately describe wireless protocols? Select three answers.

  • Wi-Fi protocols provide security levels about equal to that of wired connections.
  • IEEE is the Institute of Electrical and Electronics Engineers, which maintains WiFi standards.
  • WPA is a wired security protocol pertaining to local devices on the same network.
  • 802.11 is a suite of protocols used in wireless communication.

12. Which type of firewall analyzes network traffic for characteristics and behaviors that appear suspicious and stops them from entering the network?

  • Next-generation firewall (NGFW)
  • Stateful
  • Stateless
  • Cloud-based

13. Which of the following types of firewalls can perform deep packet inspection and intrusion detection?

  • Next generation firewall (NGFW)
  • Documented
  • Stateless
  • Stateful

14. What network security service masks a device’s virtual location to keep data private while using a public network?

  • Network segmenter
  • Cloud service provider (CSP)
  • Virtual private network (VPN)
  • Domain name system (DNS)

15. Fill in the blank: VPN services perform encapsulation to protect sensitive data by _____ it in other data packets.

  • wrapping
  • archiving
  • classifying
  • displaying

16. What network zone contains the internet and other services that are outside of an organization’s control?

  • Restricted
  • Uncontrolled
  • Controlled
  • Demilitarized

17. What is the function of the demilitarized zone (DMZ)?

  • Isolate servers exposed to the internet from the rest of a network
  • Organize data by forwarding it to other servers
  • Protect highly confidential information accessible only to employees with certain privileges
  • Encrypt data as it travels across the internet

18. Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers

  • Virtual private network (VPN)
  • Firewall
  • Proxy server
  • Router

19. What is one way forward proxies secure internal networks?

  • Both forward and reverse proxy servers add a layer of protection from the internet.
  • Forward proxy servers hide a user’s IP address and approve all outgoing requests.
  • They are useful for protecting internal web servers that contain confidential data.
  • They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.

20. Which of the following statements accurately describe wireless protocols? Select three answers.

  • WPA is a wireless security protocol pertaining to connecting to the internet.
  • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
  • Wi-Fi protocols provide significantly lower security levels than wired connections.
  • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.

21. A firewall administrator sets up a firewall that operates based on predefined rules. It is not used to keep track of information from data packets. What class of firewall does this scenario describe?

  • Cloud-based
  • Next-generation firewall (NGFW)
  • Stateful
  • Stateless

22. A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?

  • Firewall
  • Address resolution protocol (ARP)
  • Virtual private network (VPN)
  • Cloud service provider (CSP)

23. Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.

  • network segmentation
  • transmission control
  • encapsulation
  • packet sniffing

24. What network is part of the uncontrolled zone?

  • Internet
  • Subnets
  • Web servers
  • Internal networks

25. Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.

  • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
  • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
  • Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
  • Forward proxy servers regulate and restrict a person’s access to the internet.

26. What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?

  • Hypertext Transfer Protocol Secure (HTTPS)
  • Address Resolution Protocol (ARP)
  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
  • Transmission Control Protocol (TCP)

27. What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?

  • Uncontrolled zone
  • Demilitarized zone
  • Restricted zone
  • Virtual private network

28. A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.

  • Determine whether requests to connect to a website are allowed
  • Use public IP addresses that are different from the rest on the private network
  • Temporarily stores data that is frequently requested by external servers
  • Divide the network into segments to maintain privacy within corporate groups

29. Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.

  • Reverse proxy
  • Forward proxy
  • Virtual private network (VPN)
  • Next generation firewall (NGFW)

Leave a Reply