
Coursera 3 Risk mit
Authored by Злата Кобринец
Computers
KG
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Security through abecurity iplies which af the folowing?
Open source software is secure
Proprietary sofware right be best kept secret
Designers should hide functions behind frewals
All of the above
Crypla is net strang enougth
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The information that comprises a TCP/IP five-tuple include which of the following?
Five source and destination IP addresses
Three source IP addresses and two destination IP addresses
Two source IP addresses and three destination IP addresses
One source IP address, one destination IP address, two ports, and one protocol OAll of the above
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is a false statement?
A five-tuple firewall makes packet decisions
lnbound packets from an internal source IP are suspicious
Outbound packets from an external source IP are suspicious
UDP packets with ACK bit set to 1 are suspicious
All of the above
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Why is the ACK packet so useful in establishing access decisions in a TCP/IP gateway?
lt is 1 when the packet is too large
lt is only 1 when it is the first packet in a UDP session
It is 0 when it is the first packet in a TCP session
lt is 1 when it is the first packet in a TCP or UDP session OAll of the above
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
IP spoofing is intended to produce which of the following consequences?
Deceptive sender
Deceptive receiver
Deceptive content
Deceptive sender and receiver
None of the above
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Firewalls separate:
Networks from protocols OPackets from filters
Networks from networks
Software from data
All of the above
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is a true statement?
TCP/IP interoperability makes firewalls work, so it makes us more secure
TCP/IP crypto is better than analog crypto
TCP/IP interoperability is starting to wane
Security designers are wise to avoid TCP/IP
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?