All Coursera Quiz Answers

Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers

In this article i am gone to share Coursera Course: Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers with you..

Enroll Link: Assets, Threats, and Vulnerabilities


Also Visit:  Assets, Threats, and Vulnerabilities Weekly challenge 4 Quiz Answers


 

Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers

Question 1)
An employee who has access to company assets abuses their privileges by stealing information and selling it for personal gain. What does this scenario describe?

  • Threat
  • Regulation
  • Vulnerability
  • Procedure

Question 2)
Fill in the blank: A misconfigured firewall is an example of a security _____.

  • exploit
  • threat
  • vulnerability
  • asset

Question 3)
What is the first step of asset management?

  • To classify assets based on value
  • To assign a risk score to assets
  • To address an asset’s vulnerabilities
  • To make an asset inventory

Question 4)
A small group of software developers is working internally on a confidential project. They are developing a new web application for the employees at their organization. Who can the developers discuss this confidential project with? Select two answers.

  • Close friends
  • Teammates
  • External business partners
  • Project managers

Question 5)
Which of the following are examples of internal-only information? Select two answers.

  • Intellectual property
  • Business plans
  • Employee records
  • Credit card numbers

Question 6)
Why is it so challenging to secure digital information? Select two answers.

  • Technologies are interconnected.
  • Most information is in the form of data.
  • There are no regulations that protect information.
  • There are so many resources to dedicate to security.

Question 7)
What is an example of digital data at rest? Select two answers.

  • Files on a hard drive
  • Letters on a table
  • Email messages in an inbox
  • Contracts in a file cabinet

Question 8)
Who should an effective security plan focus on protecting? Select three answers.

  • Competitors
  • Customers
  • Business partners
  • Employees

Question 9)
Which of the following are components of the NIST Cybersecurity Framework? Select three answers.

  • Core
  • Controls
  • Tiers
  • Profiles

Question 10)
Which component of the NIST Cybersecurity Framework (CSF) is used to measure the performance of a security plan?

  • Tiers
  • Core
  • Framework
  • Respond

 

Question 11)
A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?

  • Threat
  • Procedure
  • Regulation
  • Vulnerability

Question 12)
Which of the following are examples of a vulnerability? Select two answers.

  • Malicious hackers stealing access credentials
  • A malfunctioning door lock
  • Attackers causing a power outage
  • An employee misconfiguring a firewall

Question 13)
An employee is asked to email customers and request that they complete a satisfaction survey. The employee must be given access to confidential information in the company database to conduct the survey. What types of confidential customer information should the employee be able to access from the company’s database to do their job? Select two answers.

  • E-mail addresses
  • Home addresses
  • Customer names
  • Credit card data

Question 14)
What is an example of restricted information? Select three answers.

  • Health information
  • Employee email addresses
  • Cardholder data
  • Intellectual property

Question 15)
What is an example of data in use? Select three answers.

  • Playing music on your phone.
  • Reading emails in your inbox.
  • Downloading a file attachment.
  • Watching a movie on a laptop.

Question 16)
Who should an effective security plan focus on protecting? Select three answers.

  • Employees
  • Competitors
  • Business partners
  • Customers

Question 17)
Which of the following are functions of the NIST Cybersecurity Framework core? Select three answers.

  • Respond
  • Implement
  • Protect
  • Detect

Question 18)
Which component of the NIST Cybersecurity Framework (CSF) is used to compare the current state of a security plan to others?

  • Profiles
  • Compliance
  • Detect
  • Core

Question 19)
Which of the following refers to the process of tracking assets and the risks that affect them?

  • Asset inventory
  • Asset administration
  • Asset classification
  • Asset management

Question 20)
What is an example of confidential information? Select two answers.

  • Project documents
  • Marketing strategy
  • Employee contacts
  • Press release

 

Question 21)
What is an example of data in transit? Select two answers.

  • A website with multiple files available for download
  • An email being sent to a colleague
  • A file being downloaded from a website
  • A slideshow presentation on a thumb drive

Question 22)
Fill in the blank: Most security plans address risks by breaking them down into these categories: damage, disclosure, and _____.

  • leakage
  • loss of information
  • deletion
  • removal

Question 23)
Which component of the NIST Cybersecurity Framework (CSF) is used to  compare the current state of a security plan to others?

  • Core
  • Detect
  • Compliance
  • Profiles

Question 24)
An attacker spreads malicious software within an organization, which executes unauthorized actions on the organization’s systems. What does this scenario describe?

  • Threat
  • Vulnerability
  • Regulation
  • Procedure

Question 25)
Fill in the blank: Information security (InfoSec) is the practice of keeping ____ in all states away from unauthorized users.

  • documents
  • files
  • data
  • processes

Question 26)
What NIST Cybersecurity Framework (CSF) tier is an indication that compliance is being performed at an exemplary standard?

  • Level-3
  • Level-4
  • Level-2
  • Level-1

Question 27)
Which of the following are examples of security vulnerabilities? Select three answers.

  • Suspended access card
  • Weak password
  • Unattended laptop
  • Unlocked doors at a business

Question 28)
What are some key benefits of a security plan? Select three answers.

  • Establish a shared set of standards for protecting assets.
  • Enhance business advantage by collaborating with key partners.
  • Define consistent policies that address what’s being protected and why.
  • Outline clear procedures that describe how to protect assets and react to threats.

Question 29)
What are the characteristics of restricted information? Select two answers.

  • It is protected with less defenses.
  • It is available to anyone in an organization.
  • It is highly sensitive.
  • It is considered need-to-know.

Question 30)
Which of the following can be prevented with effective information security? Select three answers.

  • Identity theft
  • Financial loss
  • Compliance with regulations
  • Reputational damage