connect and protect networks and network security coursera weekly challenge 4 answers

Test your knowledge: OS hardening

1. Fill in the blank: The _____ acts as an intermediary between software applications and computer hardware.

  • authorized user
  • operating system
  • access system
  • baseline

2. Which of the following activities are security hardening tasks? Select all that apply.

  • Making patch updates
  • Disposing of hardware and software properly
  • Enforcing password policies
  • Exploiting an attack surface

3. Multifactor authentication (MFA) is a security measure that requires a user to verify their identity in at least two ways before they can access a system or network.

  • True
  • False

4. What are examples of physical security hardening? Select all that apply.

  • Installing security cameras
  • Hiring security guards
  • Removing or disabling unused applications
  • Reducing access permissions across devices

Test your knowledge: Network hardening

5. Fill in the blank: Security teams can use _____ to examine network logs and identify events of interest.

  • network segmentation
  • port filtering
  • security information and event management (SIEM) tools
  • baseline configuration

6. What is a basic principle of port filtering?

  • Block all ports in a network.
  • Allow users access to only areas of the network that are required for their role. 
  • Disallow ports that are used by normal network operations.
  • Allow ports that are used by normal network operations.

7. A security professional creates different subnets for the various departments in their business, ensuring users have access that is appropriate for their particular roles. What does this scenario describe?

  • Network log analysis
  • Network segmentation
  • Patch updates
  • Firewall maintenance

8. Data in restricted zones should have the same encryption standards as data in other zones.

  • True
  • False

Shuffle Q/A 1

Test your knowledge: Cloud hardening

9. Fill in the blank: A key distinction between cloud and traditional network hardening is the use of a server baseline image, which enables security analysts to prevent _____ by comparing data in cloud servers to the baseline image.

  • slow speeds
  • damaged data
  • improper resource storage
  • unverified changes

10. Data and applications on cloud networks do not need to be separated based on their service category, such as their age or internal functionality.

  • True
  • False

Leave a Reply