All Coursera Quiz Answers

Final Exam: Cybersecurity Architecture Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 5 | Final Exam: Cybersecurity Architecture Quiz Answers with you.

Enrol Link:ย  Cybersecurity Architecture

 

Final Exam: Cybersecurity Architecture Quiz Answers

Question 1)
What is the main drawback of implementing overly complex security measures?

  • Can divide the network into two large segments
  • Can pose difficulty in implementation
  • Can complicate the process for legitimate users, leading to circumvention
  • Can divide the network into macro and micro pieces

Question 2)
Which of the following best describes the focus of ‘workforce identity management’?

  • Managing employee identities within an organization
  • Managing corporate asset identities
  • Managing customer identities
  • Managing external partner identities

Question 3)
An e-commerce organization wants to define a BYOD program. What is the most important factor that should be considered?

  • Monitoring
  • Remote wipe
  • Software requirements
  • Consent

Question 4)
What is the definition of ‘micro-segmentation’?

  • Organizing a network into large zones
  • Separating the network into two large segments
  • Creating multiple small zones within a network
  • Dividing the network into macro and micro parts

Question 5)
A cybersecurity analyst needs to perform threat hunting to identify indicators of compromise. What tools can the analyst use for the threat hunting activity?

  • Traffic analysis tools
  • SIEM and XDR tools
  • Sandbox environments
  • MFA tools

Question 6)
Identify the IT solution that can be used to manage Incident Responses (IR).

  • SIEM
  • SOAR
  • SOC
  • EDR

Question 7)
Why is it advisable to use both source code and dynamic scanners in application security?

  • For affordability
  • Increased speed
  • To identify different categories of vulnerabilities
  • To identify overlapping vulnerabilities

Question 8)
What does Quantum Space Crypto (QSC) do?

  • Generates encryption keys
  • Helps manage existing keys
  • Generates a structure pattern for unstructured data
  • Helps keep data safe from quantum threats

Question 9)
What are Indicators of Compromise (IoCs) in the context of cybersecurity?

  • Warning signals that may indicate a potential or ongoing cyberattack
  • Generates a structure pattern for unstructured data
  • Tools used by cybercriminals to breach a system
  • Signs that a system has been compromised

Question 10)
What is the primary purpose of SASE?

  • Delivering only cloud capabilities from the edge of the network
  • Providing only security capabilities from the edge of the network
  • Delivering security and network capabilities from the cloud at the network’s edge
  • Offering only network capabilities from the edge of the network

Question 11)
Which of the following cybersecurity principles helps ensure that there is never a single point of control?

  • Defense in Depth
  • KISS principle
  • Principle of Least Privilege
  • Separation of Duties

Question 12)
Which of the following threatens the Availability principle in the CIA triad, and how can it be safeguarded?

  • Data tampering, by employing controls and checksums
  • Phishing attacks, through implementing authentication and authorization
  • Hardware failure, by implementing fail-safe mechanisms, regular backups, and disaster recovery plans
  • Malware infections, by implementing encryption

Question 13)
Which of the following is TRUE about the cybersecurity architect role?

  • The architect must join the project at the implementation phase.
  • The architect defines the security coding practices for the engineers.
  • The architect must understand the system and determine what could go wrong.
  • The architect must always design using the security by obscurity principle.

Question 14)
In a cyberattack, the attacker uses multiple devices to flood the victim’s system.
Which of the following terms best describes this type of attack?

  • Denial of Service (DoS)
  • ICMP flood
  • SYN flood
  • Distributed Denial of Service (DDoS)

Question 15)
What is typically the most crucial component to safeguard in data security scenarios?

  • Source code
  • Servers where data is stored
  • Firewalls
  • Data

Question 16)
The IT department of a large e-commerce organization wants to monitor and secure accounts with high levels of access to the systems. Which access control solution can help achieve this?

  • RBAC
  • PAM
  • MFA
  • IAM

Question 17)
What can chatbots potentially expose when you use them for debugging?

  • Intellectual property
  • Developer details
  • Test cases
  • Infrastructure

Question 18)
What are some possible drawbacks of utilizing chatbots for code generation?

  • They require an uninterrupted internet connection.
  • They have the potential to introduce vulnerabilities in the code.
  • They may take a significant amount of time to generate code.
  • They write code using outdated programming languages.

Question 19)
Which of the following systems can be used to create and manage cases for an Incident Response?

  • SOAR
  • XDR
  • QSC
  • SIEM

Question 20)
Which of the following controls dictates the hardware and software that will be allowed in the organization?

  • Encryption controls
  • Wipe off policy
  • Inventory levels
  • Security policy