connect and protect networks and network security coursera weekly challenge 4 answers
Test your knowledge: OS hardening
1. Fill in the blank: The _____ acts as an intermediary between software applications and computer hardware.
- authorized user
- operating system
- access system
- baseline
2. Which of the following activities are security hardening tasks? Select all that apply.
- Making patch updates
- Disposing of hardware and software properly
- Enforcing password policies
- Exploiting an attack surface
3. Multifactor authentication (MFA) is a security measure that requires a user to verify their identity in at least two ways before they can access a system or network.
- True
- False
4. What are examples of physical security hardening? Select all that apply.
- Installing security cameras
- Hiring security guards
- Removing or disabling unused applications
- Reducing access permissions across devices
Test your knowledge: Network hardening
5. Fill in the blank: Security teams can use _____ to examine network logs and identify events of interest.
- network segmentation
- port filtering
- security information and event management (SIEM) tools
- baseline configuration
6. What is a basic principle of port filtering?
- Block all ports in a network.
- Allow users access to only areas of the network that are required for their role.Â
- Disallow ports that are used by normal network operations.
- Allow ports that are used by normal network operations.
7. A security professional creates different subnets for the various departments in their business, ensuring users have access that is appropriate for their particular roles. What does this scenario describe?
- Network log analysis
- Network segmentation
- Patch updates
- Firewall maintenance
8. Data in restricted zones should have the same encryption standards as data in other zones.
- True
False
Shuffle Q/A 1
Test your knowledge: Cloud hardening
9. Fill in the blank: A key distinction between cloud and traditional network hardening is the use of a server baseline image, which enables security analysts to prevent _____ by comparing data in cloud servers to the baseline image.
- slow speeds
- damaged data
- improper resource storage
- unverified changes
10. Data and applications on cloud networks do not need to be separated based on their service category, such as their age or internal functionality.
- True
- False