Coursera Answers

Cybersecurity Architecture Coursera Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Cybersecurity Architecture All Weeks Quiz Answers with you.

Enrol Link:  Cybersecurity Architecture

Cybersecurity Architecture Coursera Quiz Answers



Module 1 Practice Quiz: Cybersecurity Architecture Overview

Question 1)
“The security system is reliant on secret knowledge.” Which of the following best describes this statement?

  • Security by Design
  • Least Privilege
  • Defense-in-Depth
  • Security by Obscurity

Question 2)
From less than 50 members, a startup has suddenly grown to hundreds of employees across the globe, each member with different roles and access needs. Currently, the IT department is overwhelmed and struggling with managing individual user access rights.
Which access control solution can help achieve this?

  • RBAC
  • MFA
  • IAM
  • PAM

Question 3)
Which of the following threatens the integrity principle in the CIA triad, and what can you do to ensure it?

  • Data tampering: applying controls and checksums
  • Hardware failure: Implementing failsafe mechanisms, regular backups, and disaster recovery plans
  • Malware infections: Implementing encryption
  • Phishing attacks: implementing authentication and authorization

Question 4)
In a cyber attack, the attacker floods the victim with overwhelming data.
Which of the following terms best describes this type of attack?

  • Distributed Denial of Service (DDoS)
  • SYN flood
  • Plashing
  • Denial of Service (DoS)

Question 5)
Which of the following is TRUE about the cybersecurity architect role?

  • The architect uses different types of diagrams to depict the expected outcome
  • The architect implements the complete system by writing the code.
  • The architect provides the requirements for the project.
  • The architect manages the project timelines and finances.


Visit this link:   Module 1 Graded Quiz: Cybersecurity Architecture Overview Quiz Answers




Module 2 Practice Quiz: Access Management and Endpoint Security

Question 1)
What is the purpose of a Privileged Access Management (PAM) system in cybersecurity?

  • To manage and monitor privileged access
  • To secure employee email
  • To encrypt data
  • To authenticate user accounts

Question 2)
What is the importance of session recording in a cybersecurity system?

  • Implements role-based authentication
  • Monitors user activity and holds them accountable
  • Creates endpoint rules based on policies
  • Allows for real-time communication between users

Question 3)
What is a crucial consideration when choosing an MFA combination for remote access?

  • User experience should be uncomplicated
  • All users should carry a security token at all times
  • The system should be as complicated as possible
  • Biometric authentication should always be used

Question 4)
In a well-defined BYOD program, what should the policy state about monitoring?

  • The company monitors personal usage
  • The company primarily monitors corporate usage
  • The individual is responsible for securing the device for corporate security
  • The company monitors without informing the employee

Question 5)
Why is a single-factor authentication insufficient for remote access to company resources?

  • It lacks an additional layer of security
  • It provides the highest level of security
  • It is only convenient for remote access
  • It only provides a one-time password


Visit this link:   Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers




Module 3 Practice Quiz: Network, Application, and Data Security

Question 1
Which of the following monitors and controls incoming and outgoing network traffic?

  • Software-Defined Wide Area Networking (SD WAN)
  • Virtual Private Network (VPN)
  • Secure Access Service Edge
  • Firewall

Question 2
What is the primary function of a firewall in network security?

  • To provide a physical barrier to protect the network
  • To monitor and control incoming and outgoing network traffic
  • To increase the speed of data transfer on the network
  • To divide the network into smaller parts

Question 3
What is “white box” testing in the context of application security?

  • Testing the application with a white-colored interface
  • Testing the application without knowing the source code
  • Testing the application knowing the source code
  • Testing the application in a white room

Question 4
Why is it recommended to use both source code and dynamic scanners in application security?

  • Because they find different types of vulnerabilities
  • Because one is cheaper than the other
  • Because one works faster than the other
  • Because they both find the same types of vulnerabilities

Question 5
Using chatbots for debugging could potentially expose what?

  • Personal information of the developers
  • The physical location of the servers
  • The number of users on the platform
  • Intellectual property


Visit this link:   Module 3 Graded Quiz: Network, Application, and Data Security Quiz Answers




Module 4 Practice Quiz: Detection and Response

Question 1)
Which of the following detection technologies using a top-down approach?

  • SIEM
  • SOAR
  • XDR
  • SOC

Question 2)
Which of the following statements is TRUE about detection?

  • The CIA Triad helps with understanding the How of cybersecurity.
  • SIEM and XDR can only work as disjoint systems.
  • You must use detection technologies to increase the MTTI and MTTC.
  • Threat hunting is proactive action used for early detection of any intrusion.

Question 3)
What is the typical MTTI after an attack?

  • 70 days
  • 270 days
  • 200 days
  • 28 days

Question 4)
Where do you create a case?

  • SIEM
  • XDR
  • EDR
  • SOAR

Question 5)
Why is it important to notify regulatory bodies about any breach?

  • To avoid penalties
  • To improve responses
  • To capture the details of a breach
  • To limit breaches


Visit this link:   Module 4 Graded Quiz: Detection and Response Quiz Answers




Visit this link:   Final Project Graded Quiz: Recommendations to Improve Network Security Quiz Answers

Visit this link:   Final Exam: Cybersecurity Architecture Quiz Answers