Cloud and Wireless Security Coursera Quiz Answers 2022 [💯Correct Answer]

Hello Peers, Today we are going to share all week’s assessment and quiz answers of the Cloud and Wireless Security course launched by Coursera totally free of cost✅✅✅. This is a certification course for every interested student.

In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.

Check out this article “How to Apply for Financial Ads?”

About The Coursera

Coursera, India’s biggest learning platform launched millions of free courses for students daily. These courses are from various recognized universities, where industry experts and professors teach very well and in a more understandable way.


Here, you will find Cloud and Wireless Security Exam Answers in Bold Color below.

These answers are updated recently and are 100% correct✅ answers of all week, assessment, and final exam answers of Cloud and Wireless Security from Coursera Free Certification Course.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

About Cloud and Wireless Security Course

Welcome to course six. This course applies security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It’s regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both transformations are complex topics.

Course Apply Link – Cloud and Wireless Security

Cloud and Wireless Security Quiz Answers

Week 01: Cloud and Wireless Security Coursera Quiz Answers

Applied Scenario 1 Review: Partial Migration to the Cloud Quiz Answer

Q.1 As the IMI team considers the best options for the partial cloud migration, select the best answer choice. (D7, L6.1)  The team has decided to allow for more time and budget for the migration so they can take advantage of some of the advanced features and better storage options. Which migration option should they select?  

  • Deep migration
  • Shallow migration

Q.2 The team has also stressed the need to future proof the migration as much as possible and to allow for adaption or movement if the business needs change. Which cloud option would be the best choice for IMI based on this identified need?  

  • Single cloud
  • Multi-cloud

Q.3 To help the IMI board understand the options, you also indicate which options carry the lowest up-front costs. The lowest cost options would be:  

  • Deep migration and single cloud 
  • Shallow migration and multiple cloud
  • Shallow migration and single cloud
  • Deep migration and multiple cloud

Q.4 Himari has asked you to provide potential key performance indicators (KPIs) for the partial migration to the cloud. Which of the following could help to measure the success or challenges of the partial cloud migration? 

  • Error rates
  • Availability
  • Page load times
  • All of these

Knowledge Check: Identity and Security as a Service Quiz Answer

Along with SaaS, PaaS and IaaS, service providers may also offer “as a service” models such as identity as a service (IDaaS) and security as a service (SECaaS).  

  • IDaaS provides organizations within an SSO solution for use in a web-based environment. This service is usually cloud-based and a pay-for-use model. 
  • SECaaS provides a subscription-based security solution that doesn’t require hardware to be run on an organization’s premises. It is based on the software as a service concept. 

Q.1 Based on your understanding of service models and the definition of each of these models, determine whether each statement regarding IDaaS or SECaaS is TRUE or FALSE. (D7, L6.1) 

SECaaS is based on the SaS concept.  

  • True
  • False

Q.2 SECaaS provides a slower provisioning and any security tools available are limited. 

  • True
  • False

Q.3 Log management, reporting, authentication, access control and SaaS are all core features of IDaaS.  

  • True
  • False

Q,4 Antivirus solutions are really the extent of SECaaS.  

  • True
  • False

Knowledge Checks: Cloud Concepts Quiz Answer

Q,1 Which of the following is not a characteristic of clouds? (D7, L6.1) 

  • On-demand self-service 
  • Restricted network access
  • Rapid elasticity
  • Measured service 

Q,2 Which cloud deployment model refers to a proprietary network or data center? (D7, L6.1) 

  • Public
  • Hybrid
  • Community 
  • Private

Threat to Storage Types Quiz Answer

The following are three types of cloud storage options available to an organization: 

  • Block: Used where low-latency, dedicated storage is required, often by systems such as databases. 
  • File: Usually supported by network attached storage (NAS) and used where applications and users require access to shared data or files. 
  • Object: Used when data is stored as an object that is the file and its metadata which is attached to a customer of applications identifier. 

Regardless of the storage type, the threats and safeguards or countermeasures remain largely the same.

Directions: Match the critical area to the potential threat or risks the area introduces to storage types. (D7, L6.1) 

Q.1. The accidental dissemination of private or critical data to unauthorized recipients. Storage providers might accidentally make data incorrectly, thus making it public.  

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.2. Maintaining access to private data is outside of your direct control. It is impossible to ensure the correct access, which might result in the loss of privacy. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.3. Multi-tenanted providers offering shared access to devices such as servers. The data of organization A might become visible to organization B. If organization A uploads malware, all users of the shared resource might be infected. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.4. The shared storage provider now has access to all systems (their IT personnel) and thus the data. There is no direct visibility into the actions of these individuals, making malicious activity hard to see and even harder to prevent. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.5. Lack of automated recovery points (copies). Not all storage providers offer an automated service. A lack of copies can render an organization unable to function.  

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.6. The use of BYOD and IoT that can introduce devices with weakened or no security. They are also unregistered devices having access to corporate data. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • Outsourcing control

Q.7. to assist cloud migration and acts as an intermediary between users and storage providers. Can lead o a break in confidentiality, integrity, privacy, availability and accountability. 

Rogue devices

Shared resources

Data leakage

Lack of backups

Data privacy

Outsourcing control

Applied Scenario 2 Review: Data Storage – Privacy and Data Protection Implications Quiz Answer

Q.1. The IMI team has identified the following as data that will be migrated from its servers to the cloud during the first phase of the migration. Support the IMI team by identifying which sets of data have potential privacy or data protection implications.  (D7, L6.1)

  • Customer records
  • Financial reports 
  • HR records
  • Warehouse and shipping logs
  • Intellectual property (R&D only)

Q.2 Which of the following is not a cloud service model?​  (D7, L6.1)

  • Software as a service (SaaS)
  • Security as a service (SaaS)​
  • Platform as a service (PaaS)​
  • Infrastructure as a service (IaaS)

Q.3 Which of the following clouds is not a deployment model?​ (D7, L6.1)

  • Private
  • Community
  • Public
  • Charity

Q.4 What type of attack is hyperjacking?​   (D7,L6.2)

  • A rootkit​ 
  • A trogon
  • A virus
  • A worm

Knowledge Check: Cloud Security Considerations Quiz Answer

Q.1. What type of attack is hyperjacking?​   (D7,L6.2)

  • A rootkit​ 
  • A trogon
  • A virus
  • A worm

Q.2. What 802 standard is focused on wireless security?​ (D6, L6.3) 

  • 802.11a
  • 802.11g​ 
  • 802.11i
  • 802.11ac 

Q.3. Which of the following is a valid wireless mode? (D6, L6.3) 

  • Enterprise
  • Personal
  • Infrastructure
  • Business 

Week 02: Cloud and Wireless Security Coursera Quiz Answers

Chapter 6 Quiz: Cloud and Wireless Security Quiz Answer

Q.1. This quiz will help you to confirm your understanding and retention of concepts for this chapter. Please complete it by answering all questions, reviewing correct answers and feedback, and revisiting any chapter material you feel you need extra time with. Instructions

  1. This Assessment contains 10 objective item questions.
  2. Recommended time limit is 20 minutes, 2 minutes per question.
  3. Choose the best answer(s) for each question.
  4. You have unlimited attempts and may complete this assessment as many times as you would like.
  5. Passing grade for this quiz is 70%.
  6. Score of highest attempt will be calculated.

Your score and quiz report

  1. Each question carries 1 point.
  2. For each question, a 1/1 point indicates correct answer and 0/1 point indicates incorrect answer which you see upon quiz submission.
  3. Upon completion, you will be able to see your total number of attempts along with the score for each attempt.
  4. Your overall grade reflects the score of your highest attempt.
  5. Click on each attempt to view the completed quiz.

Q.1. SIP provides all the following except which one? (D6, L6.3)

  • Non-repudiation
  • Integrity protection
  • Encryption
  • Multimedia management

Q.2. When using VoIP systems, packets can arrive out of sequence. When this happens what does the system do?​ (D6, L6.3)

  • Drops them
  • Drops and requests a retransmission
  • Uses the sequence number to re-order them correctly
  • Drops them and uses packet loss concealment to deal with the missing traffic

Q.3. Also referred to as hardware as a service, ____ is a model where the customer can provision equipment “as a service” to support operations. (D7, L6.1)

  • SaaS
  • PaaS
  • IaaS
  • XaaS

Q.4. Which of the following is an important privacy and data protection consideration for cloud hosted data?​(D7, L6.1)

  • What information in the cloud is regulated under data protection laws
  • Who holds the responsibility for personal data
  • Where the personal data is processed
  • All of these

Q.5. What is network as a service (NaaS)?​ (D6, L6.2)

  • The reproduction of a complete network​
  • The partial reproduction of a network
  • Selling spare network bandwidth to a third party
  • Not a valid cloud service offering

Q.6. The Logical Disk Manager is an example of what type of virtualized storage?​  (D6, L6.2)

  • Archival and offline
  • Host-based
  • Network
  • Storage device

Q.7. Which of the following would be the best choice for a home user’s Wi-Fi security? (D6, L6.3)

  • WEP
  • SSID suppression
  • WPA Enterprise
  • WPA3

Q.8. What is the biggest security issue associated with the use of a Multiprotocol Label Switching (MPLS) network?  (D6, L6.3)

  • Lack of native encryption services
  • Lack of native authentication services
  • Use of Wired Equivalent Privacy (WEP) and Data Encryption Standard (DES) algorithms
  • The need to establish peering relationships to cross Tier 1 carrier boundaries

Q.9. Which network topology do cellular phone systems use?  (D6, L6.3)

  • Cell
  • Mesh
  • Star
  • LTE

Q.10 When considering jurisdiction, which of the following is not a consideration? ​ (D7, L6.1)

  • Who is responsible for personal data in the cloud
  • Who uploaded the data
  • Which laws apply in a dispute

More About This Course

Course 6: Cloud and Wireless Security

Welcome to course six. This course applies security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It’s regarding the way we use the data. First, we use our data on the go. In other words, data services are provided to our mobile phones, Wi-Fi, and other devices. Second, many enhanced functions are implemented through services hosted in the cloud platform, where our data is stored or processed. Both transformations are complex topics.

However, as security practitioners, we can narrow these two topics by applying the security fundamentals to secure the data. This boils down to the three basics of protecting data at rest, in motion, and in use. The data is either on the endpoint devices, servers, or other endpoints, making these services a reality.

Course 6 Learning Objectives After completing this course, the participant will be able to: 

L6.1 – Recall cloud security concepts and configurations.
L6.2 – Recognize types of virtualization and cloud security considerations.
L6.3 – Summarize the types of telecommunications and network access controls.

Course Agenda Module

1: Operate and Configure Cloud Security (Domain 7 – Systems and Application Security) Module
2: Cloud Security Considerations (Domain 6 – Network and Communications Security) Module
3: Secure Wireless Configurations (Domain 6 – Network and Communications Security)

Who Should Take This Course:

Beginners

Experience Required:

No prior experience is required

SKILLS YOU WILL GAIN

  • Cloud Computing Security
  • Wireless Security

Conclusion

Hopefully, this article will be useful for you to find all the Week, final assessment, and Peer Graded Assessment Answers of the Cloud and Wireless Security Quiz of Coursera and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also, and follow our Techno-RJ Blog for more updates.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker🙏.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock