Skip to content

Module quiz: Network security :Introduction to Networking and Cloud Computing (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. Other client–server models (Select all)

❌ Request-query-subscribe
❌ Peer-to-peer (P2P) (not a client–server model)
❌ Publish-query
Request–response model

Explanation:
Request–response is the classic client–server model. The others listed are not recognized client–server architectures.


2. Firewall rules are created using usernames and passwords.

❌ True
False

Explanation:
Firewall rules use IPs, ports, and protocols — not usernames/passwords.


3. Contemporary firewalls evolved from packet-filtering firewalls.

True
❌ False


4. Attack where the attacker intercepts communication while both parties think communication is normal

❌ Eavesdropping
❌ Backdoors
Man-in-the-middle
❌ IP spoofing


5. Two network analysis procedures used to identify threats (Select all)

❌ Change control
Continuous monitoring
Penetration testing


6. What is network sniffing?

❌ Cracking passwords
Listening to communication between network devices
❌ Spreading malware
❌ Unauthorized network access


7. Highest authorization tiers (Select all)

Administrator access
Superuser access
❌ Conditional access
❌ User access


8. Types of authorization protocols

RADIUS, LDAP, TACACS+
❌ LDAP, TLS, RADIUS
❌ LDAP, SSL, RADIUS


9. How many steps in DHCP IP assignment?

4
❌ 6
❌ 8

Explanation:
The four steps are: Discover → Offer → Request → Acknowledge (DORA).


10. DHCP relay forwards DHCP requests blocked by routers.

True
❌ False


🧾 SUMMARY TABLE

Q# Correct Answer Key Concept
1 Request–response Client-server models
2 False Firewall rule logic
3 True Firewall evolution
4 Man-in-the-middle Interception attack
5 Continuous monitoring, Pen testing Threat identification
6 Sniffing = listening Packet capture
7 Admin & Superuser Authorization tiers
8 RADIUS, LDAP, TACACS+ Auth protocols
9 4 DHCP DORA
10 True DHCP relay

.