Final Exam: Cybersecurity Architecture Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 5 | Final Exam: Cybersecurity Architecture Quiz Answers with you.
Enrol Link: Cybersecurity Architecture
Final Exam: Cybersecurity Architecture Quiz Answers
Question 1)
What is the main drawback of implementing overly complex security measures?
- Can divide the network into two large segments
- Can pose difficulty in implementation
- Can complicate the process for legitimate users, leading to circumvention
- Can divide the network into macro and micro pieces
Question 2)
Which of the following best describes the focus of ‘workforce identity management’?
- Managing employee identities within an organization
- Managing corporate asset identities
- Managing customer identities
- Managing external partner identities
Question 3)
An e-commerce organization wants to define a BYOD program. What is the most important factor that should be considered?
- Monitoring
- Remote wipe
- Software requirements
- Consent
Question 4)
What is the definition of ‘micro-segmentation’?
- Organizing a network into large zones
- Separating the network into two large segments
- Creating multiple small zones within a network
- Dividing the network into macro and micro parts
Question 5)
A cybersecurity analyst needs to perform threat hunting to identify indicators of compromise. What tools can the analyst use for the threat hunting activity?
- Traffic analysis tools
- SIEM and XDR tools
- Sandbox environments
- MFA tools
Question 6)
Identify the IT solution that can be used to manage Incident Responses (IR).
- SIEM
- SOAR
- SOC
- EDR
Question 7)
Why is it advisable to use both source code and dynamic scanners in application security?
- For affordability
- Increased speed
- To identify different categories of vulnerabilities
- To identify overlapping vulnerabilities
Question 8)
What does Quantum Space Crypto (QSC) do?
- Generates encryption keys
- Helps manage existing keys
- Generates a structure pattern for unstructured data
- Helps keep data safe from quantum threats
Question 9)
What are Indicators of Compromise (IoCs) in the context of cybersecurity?
- Warning signals that may indicate a potential or ongoing cyberattack
- Generates a structure pattern for unstructured data
- Tools used by cybercriminals to breach a system
- Signs that a system has been compromised
Question 10)
What is the primary purpose of SASE?
- Delivering only cloud capabilities from the edge of the network
- Providing only security capabilities from the edge of the network
- Delivering security and network capabilities from the cloud at the network’s edge
- Offering only network capabilities from the edge of the network
Question 11)
Which of the following cybersecurity principles helps ensure that there is never a single point of control?
- Defense in Depth
- KISS principle
- Principle of Least Privilege
- Separation of Duties
Question 12)
Which of the following threatens the Availability principle in the CIA triad, and how can it be safeguarded?
- Data tampering, by employing controls and checksums
- Phishing attacks, through implementing authentication and authorization
- Hardware failure, by implementing fail-safe mechanisms, regular backups, and disaster recovery plans
- Malware infections, by implementing encryption
Question 13)
Which of the following is TRUE about the cybersecurity architect role?
- The architect must join the project at the implementation phase.
- The architect defines the security coding practices for the engineers.
- The architect must understand the system and determine what could go wrong.
- The architect must always design using the security by obscurity principle.
Question 14)
In a cyberattack, the attacker uses multiple devices to flood the victim’s system.
Which of the following terms best describes this type of attack?
- Denial of Service (DoS)
- ICMP flood
- SYN flood
- Distributed Denial of Service (DDoS)
Question 15)
What is typically the most crucial component to safeguard in data security scenarios?
- Source code
- Servers where data is stored
- Firewalls
- Data
Question 16)
The IT department of a large e-commerce organization wants to monitor and secure accounts with high levels of access to the systems. Which access control solution can help achieve this?
- RBAC
- PAM
- MFA
- IAM
Question 17)
What can chatbots potentially expose when you use them for debugging?
- Intellectual property
- Developer details
- Test cases
- Infrastructure
Question 18)
What are some possible drawbacks of utilizing chatbots for code generation?
- They require an uninterrupted internet connection.
- They have the potential to introduce vulnerabilities in the code.
- They may take a significant amount of time to generate code.
- They write code using outdated programming languages.
Question 19)
Which of the following systems can be used to create and manage cases for an Incident Response?
- SOAR
- XDR
- QSC
- SIEM
Question 20)
Which of the following controls dictates the hardware and software that will be allowed in the organization?
- Encryption controls
- Wipe off policy
- Inventory levels
- Security policy