Home Uncategorised Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz Answers

Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz Answers

4070
0

Week 4: Introduction to Cybersecurity Tools & Cyber Attacks Quiz Answers Coursera

Firewalls Quiz Answers Coursera

Question 1: Firewalls contribute to the security of your network in which three (3) ways?

  • Prevent unauthorized modifications to internal data from an outside actor.
  • Allow only authorized access to inside the network.
  • Prevent Denial of Service (DOS) attacks.
  • Prevent an internal user from downloading data she is not authorized to access.

Question 2: Which packets are selected for inspection by a packet filtering firewall?

  • The first packet in any transmission, whether entering or leaving.
  • Every packet entering or leaving a network.
  • The first packet of every transmission but only subsequent packets when “high risk” protocols are used.
  • Every packet entering the network but no packets leaving the network.

Question 3: True or False: Application Gateways are an effective way to control which individuals can establish telnet connections through the gateway.

  • True
  • False

Question 4: Why are XML gateways used?

  • XML packet headers are different from that of other protocols and often “confuse” conventional firewalls.
  • XML traffic cannot pass through a conventional firewall.
  • XML traffic passes through conventional firewalls without inspection.
  • Conventional firewalls attempt to execute XML code as instructions to the firewall.

Question 5: Which three (3) things are True about Stateless firewalls?

  • They maintain tables that allow them to compare current packets with previous packets.
  • They are faster than Stateful firewalls.
  • They filter packets based upon Layer 3 and 4 information only (IP address and Port number)
  • They are also known as packet-filtering firewalls.

Antivirus/Antimalware Quiz Answers Coursera

Question 1: True or False: Most Antivirus/Antimalware software works by comparing each file encountered on your system against a compressed (zipped) version of known malware maintained by the vendor on the local host.

  • True
  • False

Introduction to Cryptography Quiz Answers Coursera

Question 1: How many unique encryption keys are required for 2 people to exchange a series of messages using asymmetric public key cryptogrophy?

  • 2
  • 1
  • 4
  • no keys are required

Question 2: What is Cryptographic Strength?

  • Relies on math, not secrecy
  • Ciphers that have stood the test of time are public algorithms.
  • Exclusive Or (XOR) is the “secret sauce” behind modern encryption.
  • All of the above.

Question 3: What is the primary difference between Symmetric and Asymmetric encryption?

  • Symmetric encryption is inherently less secure than Asymmetric encryption.
  • The same key is used to both encrypt and decrypt the message.
  • Asymmetric uses only single-use keys so a subscription to a key vendor is required to obtain new keys.
  • Symmetric encryption is inherently more secure than Asymmetric encryption.

Question 4: Which type of cryptographic attack is characterized by an attack based upon trial an error where many millions of keys may be attempted in order to break the encrypted message?

  • Brute force
  • Rainbow tables
  • Social Engineering
  • Known Plaintext
  • Known Ciphertext
  • All of the above.

Question 5: What is the correct sequence of steps required for Alice to send a message to Bob using asymmetric encryption?

  • Alice and Bob exchange their public keys to confirm each other’s identity and then Alice uses her private key to encrypt the message that Bob can decrypt using his private key.
  • Alice and Bob exchange their private keys to confirm each other’s identity and then Alice uses her public key to encrypt the message that Bob can decrypt using his public key.
  • Alice requests Bob’s public key and uses it to encrypt her message. Alice then sends the encrypted message to Bob who decrypts it using his private key.
  • Alice uses her private key to encrypt her message and then sends it to Bob. Bob requests Alice’s public key and uses it to decrypt the message.

First look at Penetration Testing and Digital Forensics Quiz Answers Coursera

Question 1: A skilled penetration tester wants to show her employer how smart she is in hopes of getting a promotion. Without obtaining permission, she hacks into the company’s new online store to see if there are any weaknesses that can be hardened before the system goes live. She does not do any damage and writes a useful report which she sends over her boss’s head to the CISO. What color hat was she wearing?

  • A White Hat
  • A Gray Hat
  • A Black Hat
  • A Pink Hat
  • A Rainbow Hat

Question 2: Which three (3) are resources that are available to help guide penetration testing efforts by cybersecurity specialists?

  • NIST SP 800-42 Guidelines on Network Security Testing.
  • Open Source Security Testing Methodology Manual (OSSTMM).
  • Information Systems Security Assessment Framework (ISSAF)
  • General Data Protection Regulation (GDPR)

Question 3: According to the Vulnerability Assessment Methodology, Potential Impacts are determined by which 2 factors?

  • Sensitivity and Adaptive Capacity
  • Exposure and Sensitivity
  • Identify Indicators and Exposure
  • Potential Impacts and Adaptive Capacity

Question 4: In digital forensics, the term Chain of Custody refers to what?

  • This is a digital “chain” that isolated digital evidence from being disturbed until it can be analyzed by the police or other authorities.
  • This is a physical chain that is place around a crime scene to protect the evidence from being disturbed.
  • This chain of custody is simply a written record of who possessed the evidence as it moves from collection to analysis to presentation in a court of law.
  • The record that documents the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.

Key security tools Quiz Answers Coursera

Question 1: What is the primary function of a firewall?

  • Scans the system and search for matches against the malware definitions.
  • Secures communication that may be understood by the intended recipient only.
  • Uses malware definitions.
  • Filter traffic between networks.

Question 2: How many unique encryption keys are required for 2 people to exchange a series of messages using symmetric key cryptography?

  • 1
  • 2
  • 4
  • no keys are required

Question 3: What are the three (3) types of modern encryption?

  • Ciphertext
  • Asymmetric
  • Hash
  • Symmetric

Question 4: What is Locard’s exchange principle?

  • An entity that is partially or wholly responsible for an incident that affects or potentially affects an organization’s security.
  • Refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
  • Includes the identification, recovery, investigation, validation, and presentation of facts regarding digital evidence found on computers or similar digital storage media devices.
  • The perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence.

Question 5: Which two (2) are types of firewall?

  • Statutory
  • Packet-filtering
  • Protocol-filtering
  • Application-level

Question 6: Which type of data does a packet-filtering firewall inspect when it decides whether to forward or drop a packet?

  • Source and destination IP addresses.
  • TCP/UDP source and destination port numbers.
  • ICMP message type.
  • TCP SYN and ACK bits.
  • All of the above.

Question 7: Which three (3) of the following are limitations of Application gateways?

  • Application gateways are susceptible to IP spoofing.
  • Client software must be “smart” and know to contact the gateway.
  • Application gateways are not good and understanding protocols such as telnet.
  • Each application to be managed needs its own gateway.

Question 8: Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

  • An XML Gateway.
  • An application-level firewall.
  • A packet-filtering firewall.
  • All of the above.

Question 9: Which statement about Stateful firewalls is True?

  • They have state tables that allow them to compare current packets with previous packets.
  • They are less secure in general than Stateless firewalls.
  • They are faster than Stateless firewalls.
  • All of the above.

Question 10: True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.

  • True
  • False

Question 11: Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?

  • Known Plaintext
  • Known Ciphertext
  • Brute force
  • Social Engineering
  • Rainbow tables

Question 12: What are two (2) drawbacks to using symmetric key encryption?

  • The sender and recipient must find a secure way to share the key itself.
  • You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.
  • Symmetric key encryption is slower than asymmetric key encryption.
  • A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.

LEAVE A REPLY

Please enter your comment!
Please enter your name here