Module quiz: Network security :Introduction to Networking and Cloud Computing (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. Other client–server models (Select all)
❌ Request-query-subscribe
❌ Peer-to-peer (P2P) (not a client–server model)
❌ Publish-query
✅ Request–response model
Explanation:
Request–response is the classic client–server model. The others listed are not recognized client–server architectures.
2. Firewall rules are created using usernames and passwords.
❌ True
✅ False
Explanation:
Firewall rules use IPs, ports, and protocols — not usernames/passwords.
3. Contemporary firewalls evolved from packet-filtering firewalls.
✅ True
❌ False
4. Attack where the attacker intercepts communication while both parties think communication is normal
❌ Eavesdropping
❌ Backdoors
✅ Man-in-the-middle
❌ IP spoofing
5. Two network analysis procedures used to identify threats (Select all)
❌ Change control
✅ Continuous monitoring
✅ Penetration testing
6. What is network sniffing?
❌ Cracking passwords
✅ Listening to communication between network devices
❌ Spreading malware
❌ Unauthorized network access
7. Highest authorization tiers (Select all)
✅ Administrator access
✅ Superuser access
❌ Conditional access
❌ User access
8. Types of authorization protocols
✅ RADIUS, LDAP, TACACS+
❌ LDAP, TLS, RADIUS
❌ LDAP, SSL, RADIUS
9. How many steps in DHCP IP assignment?
✅ 4
❌ 6
❌ 8
Explanation:
The four steps are: Discover → Offer → Request → Acknowledge (DORA).
10. DHCP relay forwards DHCP requests blocked by routers.
✅ True
❌ False
🧾 SUMMARY TABLE
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | Request–response | Client-server models |
| 2 | False | Firewall rule logic |
| 3 | True | Firewall evolution |
| 4 | Man-in-the-middle | Interception attack |
| 5 | Continuous monitoring, Pen testing | Threat identification |
| 6 | Sniffing = listening | Packet capture |
| 7 | Admin & Superuser | Authorization tiers |
| 8 | RADIUS, LDAP, TACACS+ | Auth protocols |
| 9 | 4 | DHCP DORA |
| 10 | True | DHCP relay |