Networks and Communications Security Week 6 Quiz Answer
Networks and Communications Security (ISC)²
In this article i am gone to share Coursera Course: Networks and Communications Security Week 6 Quiz Answer with you..
Quiz 6
Question 1)
Which of the following is typically deployed as a screening proxy for web servers?
- Reverse proxies
- Intrusion prevention system
- Kernal proxies
- Packet filters
Question 2)
A customer wants to keep cost to a minimum and has only ordered a single static IP address from an ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?
- Port Address Translation (PAT)
- Virtual Local Area Network (VLAN)
- Power over Ethernet (PoE)
- Virtual Private Network (VPN)
Question 3)
Which of the following should be part of a network’s perimeter defense?
- Switch
- DNS server
- VLAN
- Firewall
Question 4)
A botnet can be characterized as a?
- Type of virus
- Network used solely for internal communications
- Group of dispersed, compromised machines controlled remotely for illicit reasons
- Automatic security alerting tool for corporate networks
Question 5)
A new installation requires a network in a heavy manufacturing area with substantial amounts of electromagnetic radiation and power fluctuations. Which media is best suited for this environment if little traffic degradation is tolerated?
- Coax
- Fiber
- Wireless
- Shielded Twisted Pair
Question 6)
Which of the following are valid host addresses for NAT according to RFC1918?
- 192.168.10.257
- 172.15.10.29
- 172.168.10.31
- 10.168.10.17
Question 7)
Circuit-Switched networks do which of the following tasks?
- Divide data into packets and transmit it over a shared network
- Divide data into packets and transmit it over a virtual network
- Establish a dedicated circuit between endpoints
Question 8)
What is the biggest security issue associated with the use of a Multiprotocol Label Switching (MPLS) network?
- The need to establish peering relationships to cross Tier 1 carrier boundaries
- Lack of native encryption services
- Use of Wired Equivalent Privacy (WEP) and Data Encryption Standard (DES) algorithms
- Lack of native authentication services
Question 9)
With regards to LAN-based security, what is the key difference between the control plane and data plane?
- The control plane is where APIs are used to monitor and oversee, while the data plane is where commands are implemented.
- The data plane is where APIs are used to monitor and oversee, while the control plane is where commands are implemented.
- The data plane is where forwarding/routing decisions are made, while the control plane is where commands are implemented.
- The control plane is where forwarding/routing decisions are made, while the data plane is where commands are implemented.
Question 10)
There are several record types associated with the use of DNSSEC. What does the DS record type represent?
- A public key
- A private key
- A hash of a key
- A signature of an RRSet
Question 11)
MACsec (IEEE 802.1AE) is used to provide secure communication for all traffic on Ethernet links. How is MACsec configured?
- Using key generation
- Using connectivity associations
- Using connectivity groups
- Through key distribution
Question 12)
Layer 2 Tunneling Protocol (L2TP) is a hybrid of:
- Cisco's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP)
- Microsoft's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP)
- Microsoft's Layer 2 Forwarding (L2F) and Cisco's Point-to-Point Tunneling Protocol (PPTP)
Question 13)
What is the IEEE designation for Priority-based Flow Control (PFC) as defined in the Data Center Bridging (DCB) Standards?
- 802.1 Qau
- 802.1 Qaz
- 802.1 Qbb
- 802.1 Qbz
Question 14)
What is the integrity protection hashing function that the Session Initiation Protocol (SIP) uses?
- SHA-160
- SHA-256
- MD5
- MD4
Question 15)
LAN standard, defined by ANSI X3T9.5, specifying a 100-Mbps token-passing network using fiber-optic cable, with transmission distances of up to two kilometers.
- Fibre Channel over Ethernet (FCoE)
- Fiber distributed data interface (FDDI)
____________________________________________________________________________
0 Comments