All Coursera Quiz Answers

Foundations of Cybersecurity Weekly challenge 1 Quiz Answers

Hello Friends in this article i am gone to share Foundations of Cybersecurity Weekly challenge 1 Quiz Answers with you..

Enroll Link: Foundations of Cybersecurity


Also Visit:ย  Foundations of Cybersecurity Weekly challenge 4 Quiz Answers


 

Foundations of Cybersecurity Weekly challenge 1 Quiz Answers

Question 1)
Fill in the blank: The purpose of _____ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.

  • change-management
  • planning
  • business continuity
  • cybersecurity

Question 2)
Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply.

  • Protecting computer and network systems
  • Creating organizational policies
  • Examining in-house security issues
  • Installing prevention software

Question 3)
Which of the following entities may be an internal threat to an organization? Select three answers.

  • Customers
  • Trusted partners
  • Employees
  • Vendors

Question 4)
Fill in the blank: Identity theft is the act of stealing _____ to commit fraud while impersonating a victim.

  • trade secrets
  • personal information
  • business records
  • hardware

Question 5)
Fill in the blank: An organization that is in regulatory compliance is likely to _____ fines.

  • incur
  • avoid
  • rectify
  • encounter

Question 6)
An individual is in their first job as an entry-level security professional. They take training to learn more about the specific tools, procedures, and policies that are involved in their career. What does this scenario describe?

  • Understanding different perspectives
  • Transferring capabilities from one career to another
  • Gaining new technical skills
  • Improving management capabilities

Question 7)
Fill in the blank: Security _____ and event management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

  • identity
  • intelligence
  • information
  • improvement

Question 8)
What do security professionals typically do with SIEM tools?

  • Identify threat actors and their locations
  • Identify and analyze security threats, risks, and vulnerabilities
  • Locate and preserve criminal evidence
  • Educate others about potential security threats, risks, and vulnerabilities

Question 9)
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

  • An example of PII is someoneโ€™s email address.
  • The theft of SPII is often more damaging than the theft of PII.
  • An example of SPII is someoneโ€™s last name.
  • SPII is a type of PII that falls under stricter handling guidelines.

 

Question 10)
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation.

  • changing business priorities
  • market shifts
  • unauthorized access
  • poor financial management

Question 11)
A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?

  • Installing detection software
  • Ethical hacking
  • Conducting a security audit
  • Upgrading network capacity

Question 12)
An employee receives an email that they believe to be legitimate. They click on a compromised link within the email. What type of internal threat does this scenario describe?

  • Accidental
  • Abusive
  • Operational
  • Intentional

Question 13)
What is identity theft?

  • Failing to maintain and secure user, customer, and vendor data
  • A data breach that affects an entire organization
  • Stealing personal information to commit fraud while impersonating a victim
  • Trying to gain access to an organizationโ€™s private networks

Question 14)
An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?

  • Using transferable skills
  • Having expertise with a specific procedure
  • Taking on-the-job training
  • Understanding business standards

Question 15)
A security professional investigates an alert about an unknown user accessing a system within their organization. What is the purpose of computer forensics in this situation?

  • Identify, analyze, and preserve criminal evidence
  • Establish new security frameworks, controls, and regulations for the business
  • Implement tools that help detect an incident
  • Make upgrades to network security

Question 16)
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

  • PII is any information used to infer an individualโ€™s identity.
  • An example of PII is someoneโ€™s phone number.
  • An example of SPII is someoneโ€™s biometric data.
  • Only SPII is vulnerable to identity theft.

Question 17)
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.

  • poor financial management
  • changing business priorities
  • market shifts
  • criminal exploitation

Question 18)
An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

  • Secured customer data
  • Data breach
  • Network infiltration
  • Identity theft

Question 19)
Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

  • event
  • employer
  • enterprise
  • emergency

Question 20)
A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?

  • Programming with code
  • Software upgrades
  • Computer forensics
  • Resolving error messages

Question 21)
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

  • The theft of PII is often more damaging than the theft of SPII.
  • An example of PII is someoneโ€™s date of birth.
  • Both PII and SPII are vulnerable to identity theft.
  • An example of SPII is someoneโ€™s financial information.

Question 22)
What occurs during a security audit?

  • Ethical hacking of an organization’s internal network to identify vulnerabilities
  • Prioritizing tasks, processes, and procedures
  • Review of an organizationโ€™s security records, activities, and other related documents
  • Analyzing the efficiency of an organization’s internal network

Question 23)
Which of the following proficiencies are examples of technical skills? Select two answers.

  • Communicating with employees
  • Applying computer forensics
  • Prioritizing collaboration
  • Automating tasks with programming

Question 24)
Fill in the blank: Security information and event _____ (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

  • monitoring
  • mitigation
  • management
  • maturity