Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers
In this article i am gone to share Coursera Course: Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers with you..
Enroll Link: Assets, Threats, and Vulnerabilities
Also Visit: Assets, Threats, and Vulnerabilities Weekly challenge 4 Quiz Answers
Assets, Threats, and Vulnerabilities Weekly challenge 1 Quiz Answers
Question 1)
An employee who has access to company assets abuses their privileges by stealing information and selling it for personal gain. What does this scenario describe?
- Threat
- Regulation
- Vulnerability
- Procedure
Question 2)
Fill in the blank: A misconfigured firewall is an example of a security _____.
- exploit
- threat
- vulnerability
- asset
Question 3)
What is the first step of asset management?
- To classify assets based on value
- To assign a risk score to assets
- To address an asset’s vulnerabilities
- To make an asset inventory
Question 4)
A small group of software developers is working internally on a confidential project. They are developing a new web application for the employees at their organization. Who can the developers discuss this confidential project with? Select two answers.
- Close friends
- Teammates
- External business partners
- Project managers
Question 5)
Which of the following are examples of internal-only information? Select two answers.
- Intellectual property
- Business plans
- Employee records
- Credit card numbers
Question 6)
Why is it so challenging to secure digital information? Select two answers.
- Technologies are interconnected.
- Most information is in the form of data.
- There are no regulations that protect information.
- There are so many resources to dedicate to security.
Question 7)
What is an example of digital data at rest? Select two answers.
- Files on a hard drive
- Letters on a table
- Email messages in an inbox
- Contracts in a file cabinet
Question 8)
Who should an effective security plan focus on protecting? Select three answers.
- Competitors
- Customers
- Business partners
- Employees
Question 9)
Which of the following are components of the NIST Cybersecurity Framework? Select three answers.
- Core
- Controls
- Tiers
- Profiles
Question 10)
Which component of the NIST Cybersecurity Framework (CSF) is used to measure the performance of a security plan?
- Tiers
- Core
- Framework
- Respond
Question 11)
A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?
- Threat
- Procedure
- Regulation
- Vulnerability
Question 12)
Which of the following are examples of a vulnerability? Select two answers.
- Malicious hackers stealing access credentials
- A malfunctioning door lock
- Attackers causing a power outage
- An employee misconfiguring a firewall
Question 13)
An employee is asked to email customers and request that they complete a satisfaction survey. The employee must be given access to confidential information in the company database to conduct the survey. What types of confidential customer information should the employee be able to access from the company’s database to do their job? Select two answers.
- E-mail addresses
- Home addresses
- Customer names
- Credit card data
Question 14)
What is an example of restricted information? Select three answers.
- Health information
- Employee email addresses
- Cardholder data
- Intellectual property
Question 15)
What is an example of data in use? Select three answers.
- Playing music on your phone.
- Reading emails in your inbox.
- Downloading a file attachment.
- Watching a movie on a laptop.
Question 16)
Who should an effective security plan focus on protecting? Select three answers.
- Employees
- Competitors
- Business partners
- Customers
Question 17)
Which of the following are functions of the NIST Cybersecurity Framework core? Select three answers.
- Respond
- Implement
- Protect
- Detect
Question 18)
Which component of the NIST Cybersecurity Framework (CSF) is used to compare the current state of a security plan to others?
- Profiles
- Compliance
- Detect
- Core
Question 19)
Which of the following refers to the process of tracking assets and the risks that affect them?
- Asset inventory
- Asset administration
- Asset classification
- Asset management
Question 20)
What is an example of confidential information? Select two answers.
- Project documents
- Marketing strategy
- Employee contacts
- Press release
Question 21)
What is an example of data in transit? Select two answers.
- A website with multiple files available for download
- An email being sent to a colleague
- A file being downloaded from a website
- A slideshow presentation on a thumb drive
Question 22)
Fill in the blank: Most security plans address risks by breaking them down into these categories: damage, disclosure, and _____.
- leakage
- loss of information
- deletion
- removal
Question 23)
Which component of the NIST Cybersecurity Framework (CSF) is used to compare the current state of a security plan to others?
- Core
- Detect
- Compliance
- Profiles
Question 24)
An attacker spreads malicious software within an organization, which executes unauthorized actions on the organization’s systems. What does this scenario describe?
- Threat
- Vulnerability
- Regulation
- Procedure
Question 25)
Fill in the blank: Information security (InfoSec) is the practice of keeping ____ in all states away from unauthorized users.
- documents
- files
- data
- processes
Question 26)
What NIST Cybersecurity Framework (CSF) tier is an indication that compliance is being performed at an exemplary standard?
- Level-3
- Level-4
- Level-2
- Level-1
Question 27)
Which of the following are examples of security vulnerabilities? Select three answers.
- Suspended access card
- Weak password
- Unattended laptop
- Unlocked doors at a business
Question 28)
What are some key benefits of a security plan? Select three answers.
- Establish a shared set of standards for protecting assets.
- Enhance business advantage by collaborating with key partners.
- Define consistent policies that address what’s being protected and why.
- Outline clear procedures that describe how to protect assets and react to threats.
Question 29)
What are the characteristics of restricted information? Select two answers.
- It is protected with less defenses.
- It is available to anyone in an organization.
- It is highly sensitive.
- It is considered need-to-know.
Question 30)
Which of the following can be prevented with effective information security? Select three answers.
- Identity theft
- Financial loss
- Compliance with regulations
- Reputational damage
Fill in the blank: The NIST Cybersecurity Framework (CSF) is commonly used to meet regulatory _____.
procedures
fines
***compliance
restrictions