Search Header Logo

Coursera 3 Risk mit

Authored by Злата Кобринец

Computers

KG

Used 4+ times

Coursera 3 Risk mit
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Security through abecurity iplies which af the folowing?

Open source software is secure

Proprietary sofware right be best kept secret

Designers should hide functions behind frewals

All of the above

Crypla is net strang enougth

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The information that comprises a TCP/IP five-tuple include which of the following?

Five source and destination IP addresses

Three source IP addresses and two destination IP addresses

Two source IP addresses and three destination IP addresses

One source IP address, one destination IP address, two ports, and one protocol OAll of the above

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is a false statement?

A five-tuple firewall makes packet decisions

lnbound packets from an internal source IP are suspicious

Outbound packets from an external source IP are suspicious

UDP packets with ACK bit set to 1 are suspicious

All of the above

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Why is the ACK packet so useful in establishing access decisions in a TCP/IP gateway?

lt is 1 when the packet is too large

lt is only 1 when it is the first packet in a UDP session

It is 0 when it is the first packet in a TCP session

lt is 1 when it is the first packet in a TCP or UDP session OAll of the above

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

IP spoofing is intended to produce which of the following consequences?

Deceptive sender

Deceptive receiver

Deceptive content

Deceptive sender and receiver

None of the above

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Firewalls separate:

Networks from protocols OPackets from filters

Networks from networks

Software from data

All of the above

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is a true statement?

TCP/IP interoperability makes firewalls work, so it makes us more secure

TCP/IP crypto is better than analog crypto

TCP/IP interoperability is starting to wane

Security designers are wise to avoid TCP/IP

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?