Cloud and Wireless Security Coursera Quiz Answers

Get All Weeks Cloud and Wireless Security Coursera Quiz Answers

Week 01: Cloud and Wireless Security Coursera Quiz Answers

Applied Scenario 1 Review: Partial Migration to the Cloud Quiz Answer

Q.1 As the IMI team considers the best options for the partial cloud migration, select the best answer choice. (D7, L6.1)  The team has decided to allow for more time and budget for the migration so they can take advantage of some of the advanced features and better storage options. Which migration option should they select?  

  • Deep migration
  • Shallow migration

Q.2 The team has also stressed the need to future proof the migration as much as possible and to allow for adaption or movement if the business needs change. Which cloud option would be the best choice for IMI based on this identified need?  

  • Single cloud
  • Multi-cloud

Q.3 To help the IMI board understand the options, you also indicate which options carry the lowest up-front costs. The lowest cost options would be:  

  • Deep migration and single cloud 
  • Shallow migration and multiple cloud
  • Shallow migration and single cloud
  • Deep migration and multiple cloud

Q.4 Himari has asked you to provide potential key performance indicators (KPIs) for the partial migration to the cloud. Which of the following could help to measure the success or challenges of the partial cloud migration? 

  • Error rates
  • Availability
  • Page load times
  • All of these

Knowledge Check: Identity and Security as a Service Quiz Answer

Along with SaaS, PaaS and IaaS, service providers may also offer “as a service” models such as identity as a service (IDaaS) and security as a service (SECaaS).  

  • IDaaS provides organizations within an SSO solution for use in a web-based environment. This service is usually cloud-based and a pay-for-use model. 
  • SECaaS provides a subscription-based security solution that doesn’t require hardware to be run on an organization’s premises. It is based on the software as a service concept. 

Q.1 Based on your understanding of service models and the definition of each of these models, determine whether each statement regarding IDaaS or SECaaS is TRUE or FALSE. (D7, L6.1) 

SECaaS is based on the SaS concept.  

  • True
  • False

Q.2 SECaaS provides a slower provisioning and any security tools available are limited. 

  • True
  • False

Q.3 Log management, reporting, authentication, access control and SaaS are all core features of IDaaS.  

  • True
  • False

Q,4 Antivirus solutions are really the extent of SECaaS.  

  • True
  • False

Knowledge Checks: Cloud Concepts Quiz Answer

Q,1 Which of the following is not a characteristic of clouds? (D7, L6.1) 

  • On-demand self-service 
  • Restricted network access
  • Rapid elasticity
  • Measured service 

Q,2 Which cloud deployment model refers to a proprietary network or data center? (D7, L6.1) 

  • Public
  • Hybrid
  • Community 
  • Private

Threat to Storage Types Quiz Answer

The following are three types of cloud storage options available to an organization: 

  • Block: Used where low-latency, dedicated storage is required, often by systems such as databases. 
  • File: Usually supported by network attached storage (NAS) and used where applications and users require access to shared data or files. 
  • Object: Used when data is stored as an object that is the file and its metadata which is attached to a customer of applications identifier. 

Regardless of the storage type, the threats and safeguards or countermeasures remain largely the same.

Directions: Match the critical area to the potential threat or risks the area introduces to storage types. (D7, L6.1) 

Q.1. The accidental dissemination of private or critical data to unauthorized recipients. Storage providers might accidentally make data incorrectly, thus making it public.  

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.2. Maintaining access to private data is outside of your direct control. It is impossible to ensure the correct access, which might result in the loss of privacy. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.3. Multi-tenanted providers offering shared access to devices such as servers. The data of organization A might become visible to organization B. If organization A uploads malware, all users of the shared resource might be infected. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.4. The shared storage provider now has access to all systems (their IT personnel) and thus the data. There is no direct visibility into the actions of these individuals, making malicious activity hard to see and even harder to prevent. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.5. Lack of automated recovery points (copies). Not all storage providers offer an automated service. A lack of copies can render an organization unable to function.  

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • APIs
  • Outsourcing control

Q.6. The use of BYOD and IoT that can introduce devices with weakened or no security. They are also unregistered devices having access to corporate data. 

  • Rogue devices
  • Shared resources
  • Data leakage
  • Lack of backups
  • Data privacy
  • Outsourcing control

Q.7. to assist cloud migration and acts as an intermediary between users and storage providers. Can lead o a break in confidentiality, integrity, privacy, availability and accountability. 

Rogue devices

Shared resources

Data leakage

Lack of backups

Data privacy

Outsourcing control

Applied Scenario 2 Review: Data Storage – Privacy and Data Protection Implications Quiz Answer

Q.1. The IMI team has identified the following as data that will be migrated from its servers to the cloud during the first phase of the migration. Support the IMI team by identifying which sets of data have potential privacy or data protection implications.  (D7, L6.1)

  • Customer records
  • Financial reports 
  • HR records
  • Warehouse and shipping logs
  • Intellectual property (R&D only)

Q.2 Which of the following is not a cloud service model?​  (D7, L6.1)

  • Software as a service (SaaS)
  • Security as a service (SaaS)​
  • Platform as a service (PaaS)​
  • Infrastructure as a service (IaaS)

Q.3 Which of the following clouds is not a deployment model?​ (D7, L6.1)

  • Private
  • Community
  • Public
  • Charity

Q.4 What type of attack is hyperjacking?​   (D7,L6.2)

  • A rootkit​ 
  • A trogon
  • A virus
  • A worm

Knowledge Check: Cloud Security Considerations Quiz Answer

Q.1. What type of attack is hyperjacking?​   (D7,L6.2)

  • A rootkit​ 
  • A trogon
  • A virus
  • A worm

Q.2. What 802 standard is focused on wireless security?​ (D6, L6.3) 

  • 802.11a
  • 802.11g​ 
  • 802.11i
  • 802.11ac 

Q.3. Which of the following is a valid wireless mode? (D6, L6.3) 

  • Enterprise
  • Personal
  • Infrastructure
  • Business 

Week 02: Cloud and Wireless Security Coursera Quiz Answers

Chapter 6 Quiz: Cloud and Wireless Security Quiz Answer

Q.1. This quiz will help you to confirm your understanding and retention of concepts for this chapter. Please complete it by answering all questions, reviewing correct answers and feedback, and revisiting any chapter material you feel you need extra time with. Instructions

  1. This Assessment contains 10 objective item questions.
  2. Recommended time limit is 20 minutes, 2 minutes per question.
  3. Choose the best answer(s) for each question.
  4. You have unlimited attempts and may complete this assessment as many times as you would like.
  5. Passing grade for this quiz is 70%.
  6. Score of highest attempt will be calculated.

Your score and quiz report

  1. Each question carries 1 point.
  2. For each question, a 1/1 point indicates correct answer and 0/1 point indicates incorrect answer which you see upon quiz submission.
  3. Upon completion, you will be able to see your total number of attempts along with the score for each attempt.
  4. Your overall grade reflects the score of your highest attempt.
  5. Click on each attempt to view the completed quiz.

Q.1. SIP provides all the following except which one? (D6, L6.3)

  • Non-repudiation
  • Integrity protection
  • Encryption
  • Multimedia management

Q.2. When using VoIP systems, packets can arrive out of sequence. When this happens what does the system do?​ (D6, L6.3)

  • Drops them
  • Drops and requests a retransmission
  • Uses the sequence number to re-order them correctly
  • Drops them and uses packet loss concealment to deal with the missing traffic

Q.3. Also referred to as hardware as a service, ____ is a model where the customer can provision equipment “as a service” to support operations. (D7, L6.1)

  • SaaS
  • PaaS
  • IaaS
  • XaaS

Q.4. Which of the following is an important privacy and data protection consideration for cloud hosted data?​(D7, L6.1)

  • What information in the cloud is regulated under data protection laws
  • Who holds the responsibility for personal data
  • Where the personal data is processed
  • All of these

Q.5. What is network as a service (NaaS)?​ (D6, L6.2)

  • The reproduction of a complete network​
  • The partial reproduction of a network
  • Selling spare network bandwidth to a third party
  • Not a valid cloud service offering

Q.6. The Logical Disk Manager is an example of what type of virtualized storage?​  (D6, L6.2)

  • Archival and offline
  • Host-based
  • Network
  • Storage device

Q.7. Which of the following would be the best choice for a home user’s Wi-Fi security? (D6, L6.3)

  • WEP
  • SSID suppression
  • WPA Enterprise
  • WPA3

Q.8. What is the biggest security issue associated with the use of a Multiprotocol Label Switching (MPLS) network?  (D6, L6.3)

  • Lack of native encryption services
  • Lack of native authentication services
  • Use of Wired Equivalent Privacy (WEP) and Data Encryption Standard (DES) algorithms
  • The need to establish peering relationships to cross Tier 1 carrier boundaries

Q.9. Which network topology do cellular phone systems use?  (D6, L6.3)

  • Cell
  • Mesh
  • Star
  • LTE

Q.10 When considering jurisdiction, which of the following is not a consideration? ​ (D7, L6.1)

  • Who is responsible for personal data in the cloud
  • Who uploaded the data
  • Which laws apply in a dispute
Get All Course Quiz Answers of (ISC)² Systems Security Certified Practitioner (SSCP)

Introducing Security: Aligning Asset and Risk Management Quiz Answers

Risk Management: Use of Access Controls to Protect Assets Quiz Answers

Cryptography Coursera Quiz Answers

Securing Software, Data and End Points Coursera Quiz Answers

Networks and Communications Security Coursera Quiz Answers

Cloud and Wireless Security Coursera Quiz Answers

Incident Detection and Response Coursera Quiz Answers

Maturing Risk Management Coursera Quiz Answers

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!