Skip to main content

Posts

Showing posts with the label converting

Test your knowledge on analytical thinking

  Test your knowledge on analytical thinking #google coursera #week2 #challenged TOTAL POINTS 5 1 . Question 1 What practice involves identifying, defining, and solving a problem by using data in an organized, step-by-step manner? 0 / 1  point Context Visualization Data design Analytical thinking Incorrect Analytical thinking involves identifying and defining a problem, then solving it by using data in an organized, step-by-step manner. Data design describes how analysts organize information. 2 . Question 2 Data visualization is the graphical representation of information, including which of the following? Select all that apply. 1 / 1  point Graphs Correct Graphs, maps, and charts are used in data visualization. Charts Correct Graphs, maps, and charts are used in data visualization. Reports Maps Correct Graphs, maps, and charts are used in data visualization. 3 . Question 3 Gap analysis is used to examine and evaluate how a process currently works with...

IT Security: Defense against the digital dark arts

 Week 4 practice quiz, Digital Dark Arts 1 . Question 1 What traffic would an implicit deny firewall rule block? 1 point Outbound traffic Nothing unless blocked Inbound traffic Everything not allowed 2 . Question 2 The process of converting log entry fields into a standard format is called _______. 1 point Log analysis Log auditing Log encryption Log normalization 3 . Question 3 A ______ can protect your network from DoS attacks. 1 point IP Source Guard DHCP Snooping Flood Guard Dynamic ARP Inspection 4 . Question 4 Using different VLANs for different network devices is an example of _______. 1 point Network Separation Implicit Denial Remote Access Network Encryption 5 . Question 5 How do you protect against rogue DHCP server attacks? 1 point IP Source Guard Flood Guard Dynamic ARP Inspection DHCP Snooping 6 . Question 6 What does Dynamic ARP Inspection protect against? 1 point Rogue DHCP Server attacks IP Spoofing attacks ARP Man-in-the-middle attacks DoS attacks 7 . Question 7 Wh...