Networks and Communications Security Week 3 Quiz Answer

Networks and Communications Security Week 3 Quiz Answer

Networks and Communications Security Week 3 Quiz Answer


Networks and Communications Security (ISC)²

In this article i am gone to share Coursera Course: Networks and Communications Security Week 3 Quiz Answer with you..


Quiz 3

Question 1)
Most networks are prone to the threat of sniffing and eavesdropping?
  • True
  • False

Question 2)
Which of the following statements is true of ‘firewalls’? choose all that apply. 
  • Proxy firewalls can examine traffic at a much deeper level.
  • Firewalls can prevent all types of attacks.
  • Firewalls can be used to limit external and internal access to network segments.
  • Firewalls control traffic between domains – both internal and external
  • Different types of firewalls can exists, including state-less, stateful, and deep packet inspection.

Question 3)
In firewall rules, is it better to ‘allow all’ and then take away, or it is better to ‘allow none’ and then add specific rules?
  • Allow all and then take away
  • Allow none and then add specific rules

Question 4)
__________ will evaluate network traffic flows and based on a range of configurable rules, alert of possible compromise or rule anomalies. 
  • Network-based Intrusion Detection System
  • UDP

Question 5)
A solution that involves harvesting logs and event information from a variety of different sources on individual servers or assets and analyzing it as a consolidated view with sophisticated reporting.
  • Security Event Management (SEM)/Security Event and Incident Management (SEIM)
  • Simple Network Management Protocol (SNMP)

Question 6)
Real-time monitoring of events as they happen in a computer system or network, using audit trail records and network traffic and analyzing events to detect potential intrusion attempts.
  • Intrusion Detection Systems (IDS)
  • Network File System (NFS)



Post a Comment

0 Comments