Networks and Communications Security Coursera Quiz Answers 2022 [💯Correct Answer]

Hello Peers, Today we are going to share all week’s assessment and quiz answers of the Networks and Communications Security course launched by Coursera totally free of cost✅✅✅. This is a certification course for every interested student.

In case you didn’t find this course for free, then you can apply for financial ads to get this course for totally free.

Check out this article “How to Apply for Financial Ads?”

About The Coursera

Coursera, India’s biggest learning platform launched millions of free courses for students daily. These courses are from various recognized universities, where industry experts and professors teach very well and in a more understandable way.


Here, you will find Networks and Communications Security Exam Answers in Bold Color below.

These answers are updated recently and are 100% correct✅ answers of all week, assessment, and final exam answers of Networks and Communications Security from Coursera Free Certification Course.

Use “Ctrl+F” To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A “Find” Option There. Use These Option to Get Any Random Questions Answer.

About Networks and Communications Security Course

In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain the integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed.

Course Apply Link – Networks and Communications Security

Networks and Communications Security Quiz Answers

Week 01: Networks and Communications Security Coursera Quiz Answers

 The OSI Model Quiz Answer

Q.1. To review the layers of the OSI model, match each layer to its function. (D6, L5.1)  Physical characteristics of media 

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.2. Error detection

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.3.Management of connections

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.4. Reliable data delivery 

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.5. Management of sessions between applications

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.6. Standardized presentation of data 

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Q.7. Network-related application programs 

  • Transport Layer
  • Network Layer
  • Physical Layer
  • Presentation Layer
  • Application Layer
  • Session Layer
  • Data Link Layer

Knowledge Check: Apply the Fundamental Concepts of Networking

Q.1. What hardware functions at the Physical Layer? (D6, L5.1) 

  • Switch
  • Bridge
  • Router
  • Hub

Q.2. Layer 4 of the TCP model maps to which layer(s) on the OSI model?  (D6, L5.1) 

  • Application
  • Presentation  
  • Session
  • All of these

Knowledge Check: SNMP Incident Detection and Response

As we saw in Course 4, a vulnerability in the SNMPv3 protocol allowed for the delivery and introduction of what became known as the SUNBURST attack. Although a patch has been developed and deployed, it is still possible for an organization to be vulnerable. Now, let’s consider how we protect our organizations from becoming future victims.  Directions: Place the following steps in the correct order. (D6, L5.2)  

Q.1. Examine DNS and proxy logs and cache for connections associated to domains that were associated with the attack, such as avsvmcloud[.]com 

  • Step 1
  • Step 2
  • Step 3
  • Step 4

Q.2. Review previous alerts and write rulesets that can provide the appropriate notifications 

  • Step 1
  • Step 2
  • Step 3
  • Step 4

Q.3. Check network protection devices such as firewalls, IDS and IPS systems for suspicious activity 

  • Step 1
  • Step 2
  • Step 3
  • Step 4

Q.4. Check to ensure that you are not running a vulnerable Orion version 

  • Step 1
  • Step 2
  • Step 3
  • Step 4

Q.5. What hardware functions at the Physical Layer? (D6, L5.1) 

  • Switch
  • Bridge
  • Router
  • Hub

Q.6. Layer 4 of the TCP model maps to which layer(s) on the OSI model?  (D6, L5.1) 

  • Application
  • Presentation  
  • Session
  • All of these

Week 02: Networks and Communications Security Coursera Quiz Answers

Activity 2: Attacks on Layers 2-4 Quiz Answer

As you have learned, layers 1 through 4 are where raw data is broken down into smaller units, segments, packets, frames and transmission or bits.  Directions: Focusing your attention on layers 2 through 4, use the matching activity to identify network attacks common to these layers. (D6, L5.3) 

FramePacketSegment
ARP poisoning Route table poisoning Session hijack
MAC flood Smurf  Half connect scan 
VLAN hopping Ping flood SYN flood 
Broadcast storms ICMP tunneling Sequence prediction
MAC spoofing Trace route NTP desynchronization

Q.1. Creating a loop in a switch to stop all traffic through the switch 

  • ARP poisoning 
  • MAC flood
  • VLAN hopping 
  • Broadcast storms
  • MAC spoofing

Q.2. Corrupting a victim’s ARP cache

  • ARP poisoning 
  • MAC flood
  • VLAN hopping 
  • Broadcast storms
  • MAC spoofing

Q.3. Jumping between VLANs in a switch 

  • ARP poisoning 
  • VLAN hopping 
  • Broadcast storms
  • MAC spoofing

Q.4. Disguising a machine to gain access to a network using a known good MAC 

  • ARP poisoning 
  • VLAN hopping 
  • Broadcast storms
  • MAC spoofing

Q.5. Flooding a switch’s ARP table, forcing the switch to broadcast 

  • ARP poisoning 
  • VLAN hopping 
  • Broadcast storms
  • mac spoofing
  • MAC flood

Activity 3: Attacks on Layers 5-7

Q.1. As we have just seen, layers 5 through 7 deal with the raw data, before it is broken down into smaller units. It is important to note that you may notice attacks of a similar nature running across multiple layers within the OSI model. Directions: Focusing your attention on layers 5 through 7, use the matching activity to identify network attacks common to these layers. (D6, L5.3) 

Session Presentation 
Session hijackSQL injection 
Man-in-the-middle (MITM)Cross-site scripting 
ARP and DNS poisoning Use of non-standard formats
Man-in-the browser (MITB) Weakening of encryption 
  • Poisoning of hosts and zone files
  • Session hijack 
  • Man-in-the-middle (MITM)
  • ARP and DNS poisoning
  • Man-in-the browser (MITB) 

Q.2. Sitting and listening to a “conversation” between two nodes and taking control by spoofing an identity

  • Session hijack 
  • Man-in-the-middle (MITM)
  • ARP and DNS poisoning 
  • Man-in-the browser (MITB) 

Q.3. Trojans in browser helpers, add-ons or other software

  • Session hijack 
  • Man-in-the-middle (MITM)
  • ARP and DNS poisoning 
  • Man-in-the browser (MITB) 

Q.4. Used to formulate a session hijack, among other things

  • Session hijack 
  • Man-in-the-middle (MITM)
  • ARP and DNS poisoning 
  • Man-in-the browser (MITB) 

Knowledge Check: Network Attacks and Countermeasures

Q.1. What is a SYN flood attack? (D6, L5.3) 

  • This Application Layer attack enables cross-site scripting attacks to occur. 
  • This Network Layer attack attempts to overwhelm routers with false or incomplete UDP control flows. 
  • This Transport Layer attack attempts to overwhelm routers with false or incomplete TCP handshakes.
  • This Transport Layer attack attempts to overwhelm servers with incomplete TCP handshakes. 

Q.2. What is an ICMP redirect? (D6, L5.3) 

  • An attacker sends an ICMP redirect to a host telling it to use the attacker’s machine as a default route. This creates a man-in-the-middle. 
  • This is a defensive or mitigation step taken to recover network operations after a router or server has been quarantined off the network.
  • This manipulates the echo request in an attempt to disrupt service. 
  • This is a routine action taken by the management plane of a router when a link to another router has excessive timeouts or has fallen silent. 

Knowledge Check: Firewall Design Types and Placements

Q.1. Directions: Review firewalls by answering the following questions: (D6, L5.4)  Which of the following is a firewall option?  

  • Stateful
  • Stateless  
  • Deep packet inspection (DPI) 
  • All of these 

Q.2. Which firewall type examines each packet in the context of a session?  

  • Stateful 
  • Stateless
  • Deep packet inspection (DPI)

Q.3. Which firewall type inspects and assesses the packet header and the data portion of the packet? 

  • Stateful  
  • Stateless  
  • Deep packet inspection (DPI)  

Q.4. Which firewall type examines each packet without regard to the packet’s context in a session?   

  • Stateful  
  • Stateless  
  • Deep packet inspection (DPI) 

Applied Scenario 1: Switches, VLANs, and Routers

Q,1 Based on the objectives and the proposed layout of IMI’s network, should you select a Layer 2 or Layer 3 switch? (D6, L5.4) 

  • Layer 2
  • Layer 3

Q,2, Does the current network diagram satisfy the key requirement of high availability? (D6, L5.4)

  • Yes
  • No

Knowledge Check: Network Security

Q.1. In software-defined networking (SDN), network elements run on which layer?  (D6, L5.4) 

  • Application plane
  • Controller plane
  • Data plane
  • Storage plane

Week 03: Networks and Communications Security Coursera Quiz Answers

Chapter 5 Quiz: Networking and Cloud Security Quiz Answer

This quiz will help you to confirm your understanding and retention of concepts for this chapter. Please complete it by answering all questions, reviewing correct answers and feedback, and revisiting any chapter material you feel you need extra time with. Instructions

  1. This Assessment contains 10 objective item questions.
  2. Recommended time limit is 20 minutes, 2 minutes per question.
  3. Choose the best answer(s) for each question.
  4. You have unlimited attempts and may complete this assessment as many times as you would like.
  5. Passing grade for this quiz is 70%.
  6. Score of highest attempt will be calculated.

Your score and quiz report

  1. Each question carries 1 point.
  2. For each question, a 1/1 point indicates correct answer and 0/1 point indicates incorrect answer which you see upon quiz submission.
  3. Upon completion, you will be able to see your total number of attempts along with the score for each attempt.
  4. Your overall grade reflects the score of your highest attempt.
  5. Click on each attempt to view the completed quiz.

Q.1. What is the correct sequence of the three-way handshake?​ (D6, L5.4)

  • SYN, ACK, FIN
  • SYN, SYN/ACK, FIN
  • SYN, SYN/ACK, RST
  • SYN, SYN/ACK, ACK

Q.2. 2001:cdba:0::::3257:9652 is an example of what type of address?​  (D6, L5.2)

  • IPv4
  • MAC
  • IPv6
  • A NOS address

Q.3. All of the following are examples of bound media except which one? (D6, L5.1)

  • Twisted pair
  • Digital Subscriber Lines (DSL)
  • Coaxial cable
  • Fiber optic

Q.4. Layer 2 Forwarding Protocol (L2TP) uses port 1723. What type of port is this?​ (D6, L5.1)

  • Well-known
  • Dynamic
  • Registered
  • Ephemeral

Q.5. Which port is used by Secure Shell (SSH)?​ (D6, L5.1)

  • 20
  • 22
  • 23
  • 25

Q.6. What type of attack manipulates an Internet Control Message Protocol (ICMP) echo request?​ (D6, L5.3)

  • Fraggle
  • Smurf
  • Land
  • Teardrop

Q.7. Which of the following manipulates the three-way handshake to create a denial-of-service (DoS) attack? ​ (D6, L5.3)

  • Session hijack
  • Redirect
  • Half connect
  • What is MACsec? (D6, L5.4)
  • SYN flood

Q.8. The implementation of IPsec for MAC OS X

  • Special hardening techniques to prevent MAC address spoofing
  • A security technology that provides point-to-point security on Ethernet links between directly connected nodes
  • A security option for SDNs that accommodates the dynamic assignment of MAC addresses to new instances of virtual machines.

Q.9. of the following networks not use a dedicated connection between endpoints? (D6, L5.1)

  • Packet-switched
  • Remote procedure calls (RPC)
  • Mandatory access
  • Circuit-switched

Q.10. In software-defined networking (SDN), all of the network management functions occur in which of the following planes? (D6, L5.4)

  • Data
  • Controller
  • Application
  • Storage

More About This Course

Welcome to the Networks and Communications Security Course!

In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain the integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed.

Course Objectives

1. Describe network-related security issues

2. Identify protective measures for telecommunication technologies

3. Define processes for controlling network access

4. Identify techniques for managing LAN-based security

5. Describe procedures for operating and configuring networked-based security devices

6. Define procedures to implement and operate wireless technologies

Conclusion

Hopefully, this article will be useful for you to find all the Week, final assessment, and Peer Graded Assessment Answers of the Networks and Communications Security Quiz of Coursera and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other course Answers. So, be with us guys we will share a lot more free courses and their exam/quiz solutions also, and follow our Techno-RJ Blog for more updates.

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker🙏.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock