Networks and Communications Security Week 2 Quiz Answer

Networks and Communications Security Week 2 Quiz Answer


Networks and Communications Security Week 2 Quiz Answer


Networks and Communications Security (ISC)²

In this article i am gone to share Coursera Course: Networks and Communications Security Week 2 Quiz Answer with you..


Quiz 2

Question 1)
A lightweight encapsulation protocol that lacks the reliable data transport of the TCP layer.

  • File Transfer Protocol (FTP)
  • Fibre Channel over Ethernet (FCoE)

Question 2)
A set of technologies that enables voice to be sent over a packet network.

  • Voice over Internet Protocol (VoIP)
  • Lightweight Directory Access Protocol (LDAP)

Question 3)
RADIUS provides centralized AAA, Authentication, _______________, and Accounting.

  • Authorization
  • Integrity


Question 4)
________ disables all unnecessary services and features that could present an additional attack surface for an attacker to exploit.

  • Hardening
  • Transferring data

Question 5)
Which of the following provides a security benefit of using fiber optic cabling over any other cabling technology?

  • Less attenuation
  • Faster data rates and throughput
  • A benefit but not really a security benefit
  • Harder to tap into
  • Less data remanence possibilities


Question 6)
A layer 2.5 networking protocol

  • iSCSI
  • MPLS

Question 7)
An example of packet switching is a Frame Relay data network, while an example of circuit switching is the PSTN (Public Switched Telephone Network).

  • True
  • False

Question 8)
Which of the following are examples of data packet switching technologies? Select all that apply.

  • Frame Relay
  • ATM
  • PPTP
  • X.25

Question 9)
Taking a voice conversation and converting into digital and transmitting it as data packets over a digital network is called _______.

  • MITM
  • VoIP
  • IP Telephony

Question 10)
Which of the following would be included as part of ‘hardening’? Select all that apply.

  • Changing default passwords
  • Disabling certain functionality
  • Physical security
  • Malware protection


Post a Comment

1 Comments