Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz answers Coursera

In this post, you will get all week 4 quiz answers of Introduction to Cybersecurity Tools & Cyber Attacks Coursera.

Enroll Here: Introduction to Cybersecurity Tools & Cyber Attack – Coursera

Course overview (All weeks quizzes answers link)

Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz answers Coursera

Now, let’s start with Week 4 quiz answers which is a part of Introduction to Cybersecurity Tools & Cyber Attacks – Coursera

Week 4: Introduction to Cybersecurity Tools & Cyber Attacks quiz answers coursera

Below you’ll find all practice quiz answers of different topics/sections in Introduction to Cybersecurity Tools & Cyber Attacks Quiz answers Coursera and end quiz exam answers under week 4.

Practice Quiz: Firewalls Quiz Answers Coursera – 5 questions

Q1. Firewalls contribute to the security of your network in which three (3) ways?

  • Allow only authorized access to inside the network.
  • Prevent unauthorized modifications to internal data from an outside actor.
  • Prevent an internal user from downloading data she is not authorized to access.
  • Prevent Denial of Service (DOS) attacks.

Q2. Which packets are selected for inspection by a packet filtering firewall?

  • The first packet in any transmission, whether entering or leaving.
  • Every packet entering or leaving a network.
  • The first packet of every transmission but only subsequent packets when “high risk” protocols are used.
  • Every packet entering the network but no packets leaving the network.

Q3. True or False: Application Gateways are an effective way to control which individuals can establish telnet connections through the gateway.

  • True
  • False

Q4. Why are XML gateways used?

  • XML packet headers are different from that of other protocols and often “confuse” conventional firewalls.
  • XML traffic cannot pass through a conventional firewall.
  • XML traffic passes through conventional firewalls without inspection.
  • Conventional firewalls attempt to execute XML code as instructions to the firewall.

Q5. Which three (3) things are True about Stateless firewalls?

  • They maintain tables that allow them to compare current packets with previous packets.
  • They are faster than Stateful firewalls.
  • They filter packets based upon Layer 3 and 4 information only (IP address and Port number)
  • They are also known as packet-filtering firewalls.

Practice Quiz: Antivirus/Antimalware Quiz Answers Coursera – 1 question

Q1. True or False: Most Antivirus/Antimalware software works by comparing each file encountered on your system against a compressed (zipped) version of known malware maintained by the vendor on the local host.

  • False
  • True

Practice Quiz: Introduction to Cryptography Quiz Answers Coursera – 5 questions

Q1. How many unique encryption keys are required for 2 people to exchange a series of messages using asymmetric public key cryptography?

  • 1
  • no keys are required
  • 4
  • 2

Q2. What is Cryptographic Strength?

  • Relies on math, not secrecy
  • Ciphers that have stood the test of time are public algorithms.
  • Exclusive Or (XOR) is the “secret sauce” behind modern encryption.
  • All of the above.

Q3. What is the primary difference between Symmetric and Asymmetric encryption?

  • Symmetric encryption is inherently less secure than Asymmetric encryption.
  • The same key is used to both encrypt and decrypt the message.
  • Asymmetric uses only single-use keys so a subscription to a key vendor is required to obtain new keys.
  • Symmetric encryption is inherently more secure than Asymmetric encryption.

Q4. Which type of cryptographic attack is characterized by an attack based upon trial and error where many millions of keys may be attempted in order to break the encrypted message?

  • Brute force
  • Rainbow tables
  • Social Engineering
  • Known Plaintext
  • Known Ciphertext
  • All of the above.

Q5. What is the correct sequence of steps required for Alice to send a message to Bob using asymmetric encryption?

  • Alice requests Bob’s public key and uses it to encrypt her message. Alice then sends the encrypted message to Bob who decrypts it using his private key.
  • Alice uses her private key to encrypt her message and then sends it to Bob. Bob requests Alice’s public key and uses it to decrypt the message.
  • Alice and Bob exchange their public keys to confirm each other’s identity and then Alice uses her private key to encrypt the message that Bob can decrypt using his private key.
  • Alice and Bob exchange their private keys to confirm each other’s identity and then Alice uses her public key to encrypt the message that Bob can decrypt using his public key.

Practice Quiz: First look at Penetration Testing and Digital Forensics Quiz Answers Coursera – 4 questions

Q1. A skilled penetration tester wants to show her employer how smart she is in hopes of getting a promotion. Without obtaining permission, she hacks into the company’s new online store to see if there are any weaknesses that can be hardened before the system goes live. She does not do any damage and writes a useful report which she sends over her boss’s head to the CISO. What color hat was she wearing?

  • A White Hat
  • A Gray Hat
  • A Black Hat
  • A Pink Hat
  • A Rainbow Hat

Q2. Which three (3) are resources that are available to help guide penetration testing efforts by cybersecurity specialists?

  • NIST SP 800-42 Guidelines on Network Security Testing.
  • Information Systems Security Assessment Framework (ISSAF)
  • General Data Protection Regulation (GDPR)
  • Open Source Security Testing Methodology Manual (OSSTMM).

Q3. According to the Vulnerability Assessment Methodology, Potential Impacts are determined by which 2 factors?

  • Potential Impacts and Adaptive Capacity
  • Exposure and Sensitivity
  • Identify Indicators and Exposure
  • Sensitivity and Adaptive Capacity

Q4. In digital forensics, the term Chain of Custody refers to what?

  • This is a digital “chain” that isolated digital evidence from being disturbed until it can be analyzed by the police or other authorities.
  • The record that documents the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
  • This chain of custody is simply a written record of who possessed the evidence as it moves from collection to analysis to presentation in a court of law.
  • This is a physical chain that is place around a crime scene to protect the evidence from being disturbed.

Quiz: An overview of key security tools Week 4 Quiz Answers Coursera – 12 questions

Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz answers Coursera

This is the end quiz of week 4 in Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz answers Coursera. It is necessary to complete with 80% or higher.

Q1. What is the primary function of a firewall?

  • Uses malware definitions.
  • Filter traffic between networks.
  • Scans the system and search for matches against the malware definitions.
  • Secures communication that may be understood by the intended recipient only.

Q2. How many unique encryption keys are required for 2 people to exchange a series of messages using symmetric key cryptography?

  • 1
  • 2
  • 4
  • no keys are required

Q3. What are the three (3) types of modern encryption?

  • Asymmetric
  • Symmetric
  • Hash
  • Ciphertext

Q4. What is Locard’s exchange principle?

  • Refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
  • An entity that is partially or wholly responsible for an incident that affects or potentially affects an organization’s security.
  • The perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence.
  • Includes the identification, recovery, investigation, validation, and presentation of facts regarding digital evidence found on computers or similar digital storage media devices.

Q5. Which two (2) are types of firewall?

  • Statutory
  • Packet-filtering
  • Application-level
  • Protocol-filtering

Q6. Which type of data does a packet-filtering firewall inspect when it decides whether to forward or drop a packet?

  • Source and destination IP addresses.
  • TCP/UDP source and destination port numbers.
  • ICMP message type.
  • TCP SYN and ACK bits.
  • All of the above.

Q7. Which three (3) of the following are limitations of Application gateways?

  • Each application to be managed needs its own gateway.
  • Application gateways are not good at understanding protocols such as telnet.
  • Client software must be “smart” and know to contact the gateway.
  • Application gateways are susceptible to IP spoofing.

Q8. Which type of firewall inspects XML packet payloads for things like executable code, a target IP address that make sense, and a known source IP address?

  • An XML Gateway.
  • An application-level firewall.
  • A packet-filtering firewall.
  • All of the above.

Q9. Which statement about Stateful firewalls is True?

  • They have state tables that allow them to compare current packets with previous packets.
  • They are less secure in general than Stateless firewalls.
  • They are faster than Stateless firewalls.
  • All of the above.

Q10. True or False: Most Antivirus/Antimalware software works by comparing a hash of every file encountered on your system against a table of hashs of known virus and malware previously made by the antivirus/antimalware vendor.

  • False
  • True

Q11. Which type of cryptographic attack is characterized by comparing a captured hashed password against a table of many millions of previously hashed words or strings?

  • Social Engineering
  • Known Ciphertext
  • Brute force
  • Known Plaintext
  • Rainbow tables

Q12. What are two (2) drawbacks to using symmetric key encryption?

  • A modern supercomputer can break even the most advanced symmetric key in a matter of minutes.
  • You need to use a different encryption key with everyone you communicate with, otherwise anyone who has ever received an encrypted message from you could open any message you sent to anyone else using that key.
  • The sender and recipient must find a secure way to share the key itself.
  • Symmetric key encryption is slower than asymmetric key encryption.

<< Prev: Introduction to Cybersecurity Tools & Cyber Attacks Week 3 Quiz Answers Coursera


Explore! Artificial Intelligence Foundations Exams answers – SkillUp

ULTIMATE Graphic Design quiz

170+ Grammar quiz: Beginner’s Level questions

NPTEL answers: NPTEL Operating System Fundamentals Assignment solutions

The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error then kindly inform us.

Thanks in advance.

If you need answers of any exam then let me know through contact us page.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *