Cybersecurity Architecture Coursera Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Cybersecurity Architecture All Weeks Quiz Answers with you.
Enrol Link: Cybersecurity Architecture
Cybersecurity Architecture Coursera Quiz Answers
WEEK 1 QUIZ ANSWERS
Module 1 Practice Quiz: Cybersecurity Architecture Overview
Question 1)
“The security system is reliant on secret knowledge.” Which of the following best describes this statement?
- Security by Design
- Least Privilege
- Defense-in-Depth
- Security by Obscurity
Question 2)
From less than 50 members, a startup has suddenly grown to hundreds of employees across the globe, each member with different roles and access needs. Currently, the IT department is overwhelmed and struggling with managing individual user access rights.
Which access control solution can help achieve this?
- RBAC
- MFA
- IAM
- PAM
Question 3)
Which of the following threatens the integrity principle in the CIA triad, and what can you do to ensure it?
- Data tampering: applying controls and checksums
- Hardware failure: Implementing failsafe mechanisms, regular backups, and disaster recovery plans
- Malware infections: Implementing encryption
- Phishing attacks: implementing authentication and authorization
Question 4)
In a cyber attack, the attacker floods the victim with overwhelming data.
Which of the following terms best describes this type of attack?
- Distributed Denial of Service (DDoS)
- SYN flood
- Plashing
- Denial of Service (DoS)
Question 5)
Which of the following is TRUE about the cybersecurity architect role?
- The architect uses different types of diagrams to depict the expected outcome
- The architect implements the complete system by writing the code.
- The architect provides the requirements for the project.
- The architect manages the project timelines and finances.
Visit this link: Module 1 Graded Quiz: Cybersecurity Architecture Overview Quiz Answers
WEEK 2 QUIZ ANSWERS
Module 2 Practice Quiz: Access Management and Endpoint Security
Question 1)
What is the purpose of a Privileged Access Management (PAM) system in cybersecurity?
- To manage and monitor privileged access
- To secure employee email
- To encrypt data
- To authenticate user accounts
Question 2)
What is the importance of session recording in a cybersecurity system?
- Implements role-based authentication
- Monitors user activity and holds them accountable
- Creates endpoint rules based on policies
- Allows for real-time communication between users
Question 3)
What is a crucial consideration when choosing an MFA combination for remote access?
- User experience should be uncomplicated
- All users should carry a security token at all times
- The system should be as complicated as possible
- Biometric authentication should always be used
Question 4)
In a well-defined BYOD program, what should the policy state about monitoring?
- The company monitors personal usage
- The company primarily monitors corporate usage
- The individual is responsible for securing the device for corporate security
- The company monitors without informing the employee
Question 5)
Why is a single-factor authentication insufficient for remote access to company resources?
- It lacks an additional layer of security
- It provides the highest level of security
- It is only convenient for remote access
- It only provides a one-time password
Visit this link: Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers
WEEK 3 QUIZ ANSWERS
Module 3 Practice Quiz: Network, Application, and Data Security
Question 1
Which of the following monitors and controls incoming and outgoing network traffic?
- Software-Defined Wide Area Networking (SD WAN)
- Virtual Private Network (VPN)
- Secure Access Service Edge
- Firewall
Question 2
What is the primary function of a firewall in network security?
- To provide a physical barrier to protect the network
- To monitor and control incoming and outgoing network traffic
- To increase the speed of data transfer on the network
- To divide the network into smaller parts
Question 3
What is “white box” testing in the context of application security?
- Testing the application with a white-colored interface
- Testing the application without knowing the source code
- Testing the application knowing the source code
- Testing the application in a white room
Question 4
Why is it recommended to use both source code and dynamic scanners in application security?
- Because they find different types of vulnerabilities
- Because one is cheaper than the other
- Because one works faster than the other
- Because they both find the same types of vulnerabilities
Question 5
Using chatbots for debugging could potentially expose what?
- Personal information of the developers
- The physical location of the servers
- The number of users on the platform
- Intellectual property
Visit this link: Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers
WEEK 4 QUIZ ANSWERS
Module 4 Practice Quiz: Detection and Response
Question 1)
Which of the following detection technologies using a top-down approach?
- SIEM
- SOAR
- XDR
- SOC
Question 2)
Which of the following statements is TRUE about detection?
- The CIA Triad helps with understanding the How of cybersecurity.
- SIEM and XDR can only work as disjoint systems.
- You must use detection technologies to increase the MTTI and MTTC.
- Threat hunting is proactive action used for early detection of any intrusion.
Question 3)
What is the typical MTTI after an attack?
- 70 days
- 270 days
- 200 days
- 28 days
Question 4)
Where do you create a case?
- SIEM
- XDR
- EDR
- SOAR
Question 5)
Why is it important to notify regulatory bodies about any breach?
- To avoid penalties
- To improve responses
- To capture the details of a breach
- To limit breaches
Visit this link: Module 4 Graded Quiz: Detection and Response Quiz Answers
WEEK 5 QUIZ ANSWERS
Visit this link: Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers
Visit this link: Final Exam: Cybersecurity Architecture Quiz Answers