All Coursera Quiz Answers

Computer Security Support Fundamentals Coursera Quiz Answers

In this article i am gone to share Coursera Course: Computer Security Support Fundamentals by CompTIA | All Weeks Quiz Answers | Computer Security Support Fundamentals Coursera Quiz Answers with you..

Enrol Link:ย  Computer Security Support Fundamentals

Computer Security Support Fundamentals Coursera Quiz Answers


 

Practice Quiz: Security Threats, Vulnerabilities, and Risks

Question 1)
An organization’s level of risk is assessed by likelihood and what other factor?

  • Intent
  • Opportunity
  • Impact
  • Vulnerability

Question 2)
A user with authorized access to systems in a software development firm installs a seemingly harmless, yet unauthorized program on a workstation without the IT department’s sanction.
What type of threat is a result of this user’s action?

  • Unintentional insider threat
  • Malicious insider threat
  • Intentional attack vector
  • External threat with insider knowledge

Question 3)
Which of the following are the best examples of an insider threat? (Select TWO.)

  • Current Contractor
  • Current Hacktivist
  • Former Employee
  • Current Competitor

Question 4)
One aspect of threat modeling is to identify potential threat actors and the risks associated with each one.
When assessing the risk that any one type of threat actor poses to an organization, which of these options are the most critical factors to profile? (Select TWO.)

  • Motivation
  • Location
  • Intent
  • Education

Question 5)
Which type of threat actor is primarily motivated by the desire for social change?

  • Threat Vector
  • Fired Employee
  • Hacktivist
  • Competitor

 

Cybersecurity Support Roles Module Assessment

Question 1)
Which of the following is true about entering into the field of cybersecurity?

  • Jobs in cybersecurity are only focused on advanced knowledge.
  • Typically, jobs in cybersecurity are not very plentiful.
  • There are few entry-level jobs in the field of cybersecurity.
  • Jobs in cybersecurity are high in demand.

Question 2)
You receive a call from a panicked employee indicating that they left their laptop behind when they took an Uber to the airport.
Which option below best describes this incident in terms of cybersecurity threats?

  • Because this was a mistake and unintentional, this person is not considered a threat actor.
  • This is considered a security breach initiated by a threat actor.
  • This incident is not considered a security breach because the person is an internal employee who did not have malicious intent.
  • This is a security breach initiated by an external threat actor.

Question 3)
Which of the following is an example of a cyber security framework (CSF) that focuses exclusively on IT security and is used by many organizations?

  • National Institute of Standards and Technology (NIST)
  • CompTIA Network +
  • General Data Protection Regulation (GDPR)
  • Cybersecurity and Infrastructure Security Agency (CISA)

Question 4)
A company technician goes on vacation. While the technician is away, a critical patch released for Windows servers is not applied. What does the delay in applying the patch create on the server?

  • Attack Vector
  • Risk
  • Control
  • Vulnerability

Question 5)
After a poorly handled security breach and resulting investigation, the SOC team report recommends that the company updates its security policy. to prevent future issues. Which of the following job functions from the NIST framework best fits with this action?

  • React
  • Respond
  • Detect
  • Identify

 

 

Module Assessment


  • Microsoft Windows Administration Module Assessment

  • Secure Network Client Fundamentals Module Assessment