Saturday , July 27 2024
Breaking News

Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz Answers

Week 4: Introduction to Cybersecurity Tools & Cyber Attacks Quiz Answers Coursera

Firewalls Quiz Answers Coursera

  • Prevent unauthorized modifications to internal data from an outside actor.
  • Allow only authorized access to inside the network.
  • Prevent Denial of Service (DOS) attacks.
  • Prevent an internal user from downloading data she is not authorized to access.
  • The first packet in any transmission, whether entering or leaving.
  • Every packet entering or leaving a network.
  • The first packet of every transmission but only subsequent packets when “high risk” protocols are used.
  • Every packet entering the network but no packets leaving the network.
  • True
  • False
  • XML packet headers are different from that of other protocols and often “confuse” conventional firewalls.
  • XML traffic cannot pass through a conventional firewall.
  • XML traffic passes through conventional firewalls without inspection.
  • Conventional firewalls attempt to execute XML code as instructions to the firewall.
  • They maintain tables that allow them to compare current packets with previous packets.
  • They are faster than Stateful firewalls.
  • They filter packets based upon Layer 3 and 4 information only (IP address and Port number)
  • They are also known as packet-filtering firewalls.

Antivirus/Antimalware Quiz Answers Coursera

  • True
  • False

Introduction to Cryptography Quiz Answers Coursera

  • 2
  • 1
  • 4
  • no keys are required
  • Relies on math, not secrecy
  • Ciphers that have stood the test of time are public algorithms.
  • Exclusive Or (XOR) is the “secret sauce” behind modern encryption.
  • All of the above.
  • Symmetric encryption is inherently less secure than Asymmetric encryption.
  • The same key is used to both encrypt and decrypt the message.
  • Asymmetric uses only single-use keys so a subscription to a key vendor is required to obtain new keys.
  • Symmetric encryption is inherently more secure than Asymmetric encryption.
  • Brute force
  • Rainbow tables
  • Social Engineering
  • Known Plaintext
  • Known Ciphertext
  • All of the above.
  • Alice and Bob exchange their public keys to confirm each other’s identity and then Alice uses her private key to encrypt the message that Bob can decrypt using his private key.
  • Alice and Bob exchange their private keys to confirm each other’s identity and then Alice uses her public key to encrypt the message that Bob can decrypt using his public key.
  • Alice requests Bob’s public key and uses it to encrypt her message. Alice then sends the encrypted message to Bob who decrypts it using his private key.
  • Alice uses her private key to encrypt her message and then sends it to Bob. Bob requests Alice’s public key and uses it to decrypt the message.

First look at Penetration Testing and Digital Forensics Quiz Answers Coursera

  • A White Hat
  • A Gray Hat
  • A Black Hat
  • A Pink Hat
  • A Rainbow Hat
  • NIST SP 800-42 Guidelines on Network Security Testing.
  • Open Source Security Testing Methodology Manual (OSSTMM).
  • Information Systems Security Assessment Framework (ISSAF)
  • General Data Protection Regulation (GDPR)
  • Sensitivity and Adaptive Capacity
  • Exposure and Sensitivity
  • Identify Indicators and Exposure
  • Potential Impacts and Adaptive Capacity
  • This is a digital “chain” that isolated digital evidence from being disturbed until it can be analyzed by the police or other authorities.
  • This is a physical chain that is place around a crime scene to protect the evidence from being disturbed.
  • This chain of custody is simply a written record of who possessed the evidence as it moves from collection to analysis to presentation in a court of law.
  • The record that documents the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.

Key security tools Quiz Answers Coursera

  • Scans the system and search for matches against the malware definitions.
  • Secures communication that may be understood by the intended recipient only.
  • Uses malware definitions.
  • Filter traffic between networks.
  • 1
  • 2
  • 4
  • no keys are required
  • Ciphertext
  • Asymmetric
  • Hash
  • Symmetric
  • An entity that is partially or wholly responsible for an incident that affects or potentially affects an organization’s security.
  • Refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
  • Includes the identification, recovery, investigation, validation, and presentation of facts regarding digital evidence found on computers or similar digital storage media devices.
  • The perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence.
  • Statutory
  • Packet-filtering
  • Protocol-filtering
  • Application-level
  • Source and destination IP addresses.
  • TCP/UDP source and destination port numbers.
  • ICMP message type.
  • TCP SYN and ACK bits.
  • All of the above.
  • Application gateways are susceptible to IP spoofing.
  • Client software must be “smart” and know to contact the gateway.
  • Application gateways are not good and understanding protocols such as telnet.
  • Each application to be managed needs its own gateway.
  • An XML Gateway.
  • An application-level firewall.
  • A packet-filtering firewall.
  • All of the above.
  • They have state tables that allow them to compare current packets with previous packets.
  • They are less secure in general than Stateless firewalls.
  • They are faster than Stateless firewalls.
  • All of the above.
  • True
  • False
  • Known Plaintext
  • Known Ciphertext
  • Brute force
  • Social Engineering
  • Rainbow tables
  • The sender and recipient must find a secure way to share the key itself.
  • You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.
  • Symmetric key encryption is slower than asymmetric key encryption.
  • A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.

About Clear My Certification

Check Also

Financial Derivatives and Risk Management Certificate

Get Financial Derivatives and Risk Management Certificate from The Digital Adda which you can share …

Leave a Reply

Your email address will not be published. Required fields are marked *